Monday, 16 September 2019

Silent Zero Communication (RBNSiZeComm) Protocol to Enhance the Lifetime of Wireless Sensor Network: A Comparative Study

Volume 7 Issue 4 January - March 2019

Research Paper

Silent Zero Communication (RBNSiZeComm) Protocol to Enhance the Lifetime of Wireless Sensor Network: A Comparative Study

Deepak Sopara*, Shailaja Y. Kanawade **, Vikas Soni***
*-** Department of Electronics and Communication Engineering, Modi Institute of Technology, Naya Gaon, Rawatbhata Road, Kota-324 010 (Rajasthan), INDIA
*** Modi Institute of Technology, Naya Gaon, Rawatbhata Road, Kota-324 010 (Rajasthan), INDIA
Sopara, D., Kanawade, S., Y., & Soni, V. (2019). Silent Zero Communication (RBNSiZeComm) Protocol to Enhance the Lifetime of Wireless Sensor Network: A Comparative Study. i-manager’s Journal on Wireless Communication Networks , 7(4), 27-34. https://doi.org/10.26634/jwcn.7.4.16088

Abstract

It has already been found in the literature that Wireless Sensor Networks (WSNs) is the emerging and attractive topic of the research all around the world in recent years and have been widely applicable in the various application of engineering. The radios are employed in WSNs with only simple digital modulation techniques such as Amplitude Shift Keying (ASK), On-Off Key (OOK) and Frequency Shift Key (FSK). The lifetime of WSNs is more important factor, therefore, energy efficient communication protocol is required in order to enhance the life of WSNs. Considering this fact in the mind, in this paper, a communication protocol called as RBNSiZeComm (Redundant Binary Number Silent through Zero digit Communication) protocol has been implemented. RBNSiZeComm is basically based on a non-coherent detection and uses Redundant Binary Number (RBN) representation coupled with silent periods for communicating the digit zero. The presented communication technique (RBNSiZeComm) has been compared with some communication schemes available in the literature. RBNSiZeComm proves itself as a high energy efficient technique for data transmission. A hybrid modulation scheme using FSK and ASK with non-coherent detection based receiver has been used for this protocol. This protocol is very beneficial for the applications involving low power wireless networks for 58% to 95 % energy saving.

Investigating the Impact of Network Size on LANMAR Routing Protocol in a Multi-Hop Ad hoc Network

Volume 7 Issue 4 January - March 2019

Research Paper

Investigating the Impact of Network Size on LANMAR Routing Protocol in a Multi-Hop Ad hoc Network

Dumala Anveshini *, S. Pallamsetty**
* Research Scholar, Department of Computer Science and Systems Engineering, Andhra University, Visakhapatnam, Andhra Pradesh, India.
** Professor, Department of Computer Science and Systems Engineering, Andhra University, Visakhapatnam, Andhra Pradesh, India.
Anveshini , D,. & Setty, S., P. (2019). Investigating the Impact of Network Size on LANMAR Routing Protocol in a Multi-Hop Ad hoc Network i-manager’s Journal on Wireless Communication Networks, 7(4), 19-26. https://doi.org/10.26634/jwcn.7.

Abstract

Multi-hop network is a wireless network that is formed for a temporary purpose. Unlike wired network, no centralized control over the network. So, all the devices act as both node and router. Nodes have the property of moving with certain speed. Due to this property, there is a dynamic change in the connections among nodes. At any time, there is a change in number of nodes and their speed of movingin the network. Network size is the number of nodes participating in the networks. It has a noticeableinfluence on the network scalabilityandconnectivity. These two properties have a great impact on MANET. This paper makes an effort to study the influence of one of the most important parameters i.e. network size on the performance of MANET while implementing LANMAR routing protocol.

Design of Multiband Circular Patch Antenna for Wireless Applications

Research Paper

Design of Multiband Circular Patch Antenna for Wireless Applications

Suneel E*, Prabhakara Rao B.**
* Research Scholar, ECE Department, JNTUK, Kakinada, Andhra Pradesh, India.
** Professor of ECE (Rtd), Programme Director, School of nanotechnology, IST, JNTUK, Kakinada, Andhra Pradesh, India.
Suneel , E ., & Rao, B., P.(2019). Design of Multiband Circular Patch Antenna for Wireless Applications. i-manager’s Journal on Wireless Communication Networks, 7(4), 11-18. https://doi.org/10.26634/jwcn.7.4.15828

Abstract

A simple circular patch antenna with notch ground and arc patch is proposed in this paper. Antenna is fed with Coplanar Waveguide (CPW) feed. In this CPW feed ground exists only on top of the substrate and either side of the feed strip. Ground is notched at either top corner to achieve multiband frequency. A small arc gap is created between the feed strip which is attached to arc patch and the circular radiating patch known as capacitive loading to achieve WLAN 5.2/5.8GHz band. Antenna is fabricated on FR4 substrate having dimension (40mmx30mmx1.6mm).Relative dielectric constant of the substrate is 4.4. The proposed antenna covers multiple frequency bands with impedance bandwidth (S11 < −10dB) of 20.4% from 2.2-2.7 GHz, 61% from 4.1-7.7 GHz, and 25.5% from 8.9-11.5 GHz. These operating bands are suitable for 2.4GHz / 5.2GHz / 5.8GHz Wireless local area network (WLAN) bands and X-band applications. Effects of key design parameters such as radius of the patch and length and width of arc have been investigated. Return loss, VSWR, Radiation pattern and gain characteristics of the antenna are investigated. Antenna exhibits positive gain and good radiation characteristics over these frequency ranges. There is a good agreement between the measured and simulation results

Cross Layer Optimization with QoS for Heterogenous ad-hoc Network

Volume 7 Issue 4 January - March 2019

Research Paper

Cross Layer Optimization with QoS for Heterogenous ad-hoc Network

Anita Sethi*, Sandip Vijay **, Rakesh Kumar ***
*-*** Faculty of Computer Science and Engineering, ICFAI University
Sethi, A., Vijay, S., & Kumar, R. (2019). Cross Layer Optimization With Qos for Heterogenous Ad-Hoc Network. i-manager’s Journal on Wireless Communication Networks, 7(4), 1-10. https://doi.org/10.26634/jwcn.7.4.15752

Abstract

In this paper, different heuristics for cross-layer optimization for heterogeneous ad-hoc network are reviewed and analyzed. Up to a large extent safety issues and traffic congestion in daily life can be resolved by integrating information and communication methodology into transportation infrastructure and vehicles. High mobility, congestion scalability, dynamic behavior and self-organization makes it stiff to deployment in real time scenario. Performance of the different routing protocols in different scenarios are observed using different simulation tools by different authors in literature. It has been observed from the study that transmission range, obstacles, speed, scalability and road condition influence the performance of different protocols. Quality of Service metrics parameters like speed and mobility of node influence the performance of network. For enhancement of the network performance in real time scenario latest communication technology and infrastructure plays an important role. Packet delivery ratio, goodput and throughput of heterogeneous ad hoc network can be improved by using optimized link prediction heuristic observed by simulation.

Implementation of Internet Access in MPLS-VPN Technique on ISP

Volume 7 Issue 3 October - December 2018

Research Paper

Implementation of Internet Access in MPLS-VPN Technique on ISP

Reshma T. U.*, Komala James**
* PG Scholar, Department of Electronics and Communication Engineering, Valliammai Engineering College, Tamil Nadu, India.
** Head, Department of Electronics and Communication Engineering, Valliammai Engineering College, Tamil Nadu, India.
Reshma, T.U., James, K. (2018). Implementation of Internet Access in MPLS-VPN Technique on ISP. i-manager's Journal on Wireless Communication Networks, 7(3),38-45. https://doi.org/10.26634/jwcn.7.3.15747

Abstract

This paper proposes internet access along with MPLS VPN network to provide internet access connectivity for the customer along with their MPLS VPN connectivity. MPLS VPN network are service providers that provide MPLS Layer 3 VPN service connectivity for customers. Usually customer request internet access from the service provider that contains access. It is possible, that in case of MPLS VPN, service provider can provide internet access for customer as well. Internet access for VPN can be provided by a variety of ways with the MPLS architecture. Here internet access is provided to customer through internet service provider in ISP router. In current generation, it is very much necessary to access the Internet from an MPLS-based VPN along with addition to progressing to maintain the VPN connectivity among corporate sites. This model configuration focused on providing Internet access from the VPN Routing and Forwarding (VRF) that contains the default route to the Internet Gateway Router (IGW).
The proposed system uses three internet service providers, which provide connectivity to the customer. Three ISPs are used to provide MPLS VPN service to the customer and the fourth ISP router is used to provide internet access for the customer who also has MPLS VPN service. The below session describes how to design an MPLS CORE for internet access such that VPN remains secure. The implementation of internet over MPLS VPN is simulated by using a software GNS3 (Graphic Network Simulator) tool, which provides internet access by implementing internet in MPLS VPN technique on ISPs. The principle of this paper is to demonstrate the model configuration used to access the Internet from a Multiprotocol Label Switching (MPLS)-based VPN using a global routing technique.

Localization in Wireless Sensor Networks Using TLBO

Volume 7 Issue 3 October - December 2018

Research Paper

Localization in Wireless Sensor Networks Using TLBO

Gaurav Sharma*, Rajesh A.**
*Assistant Professor, Department of Electronics and Communication Engineering, CVR College of Engineering, Hyderabad, Telangana, India.
** Associate Professor, Department of Electronics and Communication Engineering, CVR College of Engineering, Hyderabad, Telangana, India.
Sharma,G., Rajesh,A. (2018). Localization in Wireless Sensor Networks Using TLBO. i-manager's Journal on Wireless Communication Networks, 7(3),32-37. https://doi.org/10.26634/jwcn.7.3.15932

Abstract

Localization is one of the most critical issues for Wireless Sensor Networks (WSN), since numerous applications rely upon the exact location of the sensor nodes. In last two decades, many range based and range free localization algorithms have been proposed. Generally range free algorithms are more effective, but having poor localization accuracy. Distance Vector Hop (DV-Hop) algorithm has pulled more attention of scientists because of its steadiness, practicality and less equipment cost. To accomplish higher accuracy in range free localization algorithms, an Improved DV-Hop based on Teaching Learning Based Optimization (IDV-Hop based on TLBO) algorithm has been proposed. In the proposed method, normal hop size of the node is changed by refreshing a correction factor in it. For further enhancing the precision, TLBO method has been applied in IDV-Hop, since confinement is the optimization problem whose aim is to minimize the location errors in WSNs. The procedure of TLBO is partitioned into two stages: Teacher stage and Learner stage and it is free from the calculation parameters. With the assistance of limited populace possible region, IDV-Hop based on TLBO finds the normal nodes more precisely and accomplishes higher convergence rate. Simulation results demonstrate that proposed algorithm is effective and more precise in terms of localization accuracy compared to DVHop, DV-Hop based on Genetic Algorithm (GADV-Hop) and DV-Hop based on PSO (Particle Swarm Optimization) algorithms.

Utilizing Priority-Based Queen Bee Algorithm for Power Conservation in Wireless Sensor Networks

Volume 7 Issue 3 October - December 2018

Research Paper

Utilizing Priority-Based Queen Bee Algorithm for Power Conservation in Wireless Sensor Networks

Alireza Jahani*, Sogol Rabei Savoji**, Mahdiye Bagheri***, Hooman Soori Roodavari****
* Assistant Professor and Head, Department of Information Technology, Mehralborz Institute of Higher Education, Tehran, Iran.
** Teacher and Research Assistant, Department of Information Technology.
***-**** Graduate, Department of Information Technology Engineering, Mehralborz Institute of Higher Education, Tehran, Iran.
Jahani,A., Savoji,S.R., Bagheri,M., Roodavari,H.S. (2018). Utilizing Priority-Based Queen Bee Algorithm for Power Conservation in Wireless Sensor Networks. i-manager's Journal on Wireless Communication Networks, 7(3),19-31. https://doi.org/10.26634/jwcn.7.3.15517

Abstract

Wireless Sensor Networks form small nodes that calculate and communicate with each other. In such networks, fault tolerance and security must be improved. In addition, maintaining node energy is one of the most important problems in node operation. Since wireless sensor networks have energy constraints, power conservation in these networks is very important and faces challenges. The aim of this study is to study the challenges and factors affecting node failure as well as the techniques and challenges related to power conservation. Since this study describes and introduces the performance of wireless sensor networks by including features, dimensions and relevant constraints, an appropriate algorithm for power conservation in wireless sensor networks is attempted. Therefore, power conservation techniques were studied in this paper to increase the fault tolerance of these network types and the performance of each method is separately described in different energy degradation conditions by providing a comparative table. The solution presented is a combination of priority-based methods and the Queen Bee algorithm and is introduced and analyzed to create energy-efficient clusters in wireless sensor networks. Therefore, the "Queen Bee Algorithm based on priority "(PQBA) is presented to improve power conservation and achieve the desired energy consumption. The simulation results in the CupCarbon simulator showed that more active points in the wireless sensor network lead to more clusters that reduce energy consumption by increasing the number of clusters and thus increase network lifetime.

On the Issues of Communication in FANET: A Light Fidelity Based Approach

Volume 7 Issue 3 October - December 2018

Research Paper

On the Issues of Communication in FANET: A Light Fidelity Based Approach

B. O. Sadiq*, E. A. Adedokun**, M. B. Mu’azu***, Y. A. Sha’aban****
*-**** Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria.
Sadiq.B.O., Adedokun,E.A., Mu'azu,M.B., Sha'aban,Y.A.(2018). On the Issues of Communication in FANET: A Light Fidelity Based Approach. i-manager's Journal on Wireless Communication Networks, 7(3),10-18. https://doi.org/10.26634/jwcn.7.3.15607

Abstract

This paper presents a novel approach of using Light-Fidelity to network Flying Ad-hoc Network (FANET) for information sharing in a cooperative and collaborative manner. Its inherent characteristics such as the security, nature of the links, bandwidth requirement make the choice of the communication medium in FANET important. However, due to the special features of Light Fidelity (Li-Fi) such as the inability to penetrate wall which makes it secure, the speed of data transfer greater than 1Gbps, makes it suitable as a communication medium for FANET. This work developed a Li-Fi transmitter and Receiver Circuit for FANET. This developed circuit is expected to be used as an inbuilt communication system for information sharing. The developed system was used to demonstrate the proof of concept to the product via laboratory experiment. The test bed was connected to a computer system which served as the ground terminal. In addition, test for communication range and connectivity were carried out. The communication range is currently24 m.

A Framework for Physical Home Security Using Mobile Intrusion Detection System

Volume 7 Issue 3 October - December 2018

Research Paper

A Framework for Physical Home Security Using Mobile Intrusion Detection System

Shefiu Olusegun Ganiyu*, Abideen Ismail **, Joseph A. Ojeniyi ***, Toheeb Adediran****
* Lecturer, Department of Information and Media Technology, Federal University of Technology Minna, Nigeria.
** Research Scholar, Department of Telecommunication Engineering, Federal University of Technology Minna, Nigeria.
*** Lecturer, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
**** PG Scholar, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
Ganiyu,S.O., Ismail,A., Ojeniyi,J.A., Adediran,T. (2018). A Framework for Physical Home Security Using Mobile Intrusion Detection System.i-manager's Journal on Wireless Communication Networks,7(3), 1-9. https://doi.org/10.26634/jwcn.7.3.15931

Abstract

Physical Intrusion Detection Systems (PIDS) are deployed as complementary security measures to ensure safety of home and other edifices from burglars. Several systems have been proposed for physical intrusion using single or multiple detection sensors, surveillance cameras amongst others. Often, some systems send messages containing text, image or video of suspected intruders to responders via wireless communication networks. However, the systems were custombuilt from assemblage of disparate hardware components, which increased the cost of implementation and required some levels of expertise to setup. Also, research efforts to curtail false intrusion alerts from the PIDS have not been sufficiently addressed. Thus, this paper presents a framework for Mobile-based Physical Intrusion Detection System (MPIDS) that turns smart mobile devices to PIDS for home or personal usage. Subsequently, the framework was conceptually and empirically validated for physical home security. In reality, the proposed M-PIDS could save cost, reduce false intrusion alert rate and minimize setup effort, while increasing physical security for smart city dwellers.

Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and Countermeasures

Volume 7 Issue 2 July - September 2018

Research Paper

Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and Countermeasures

Idris Ismaila*, Muhammad Umar Majigi**, Shafi’i Muhammad Abdulhamid***, Morufu Olalere****, Muhammad Bashir Abdullahi*****, Vivian O. Nwaocha******
*_****Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria.
***** Department of Computer Science, Federal University of Technology, Minna, Nigeria.
******Department of Computer Science, National Open University of Nigeria, Nigeria.
Ismaila, I.,Majigi,M.U.,Abdulhamid,S.M.,Olalere,M.,Abdullahi.M.B.,and Nwaocha,V.O.(2018). Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and Counter measures. i-manager's Journal on Wireless Communication Networks,7(2), 42-51. https://doi.org/10.26634/jwcn.7.2.15604

Abstract

In order to safeguard a University’s networked assets, a network administrator must decide how to harden the network. To aid the decision-making process, network administrators may use network hardening suggestions. A critical drawback of currently available analyses is the lack of consideration for the network administrator on identified vulnerabilities, risk figure, risk priority level classification and network security mechanism. Nessus and Nmap are network vulnerability scanner used for this research. Internal and external scan results tabulated. The result shows that firewall constitute 81 on scale of 1-100 risk priority level classification of university information and technology service (ITS) network with high risk security level and open email relay constitute 2 with low risk level. Thus, the research establish a university secure network architecture model that contributed towards understanding risk priority level and also overcome shortcoming in choosing appropriate security measures.

Design of a Wireless Network for Rural Communities

Volume 7 Issue 2 July - September 2018

Research Paper

Design of a Wireless Network for Rural Communities

Osahon Okoro*, Azom E. Edim**
* Academic Lecturer, Department of Computer Science, University of Calabar, Nigeria.
**Associate Professor, Department of Computer Science, University of Calabar, Nigeria.
Osahon,O.,and Edim,A.E. (2018).Design of a Wireless Network for Rural Communities. i-manager's Journal on Wireless Communication Networks,7(2), 32-41. https://doi.org/10.26634/jwcn.7.2.15608

Abstract

Wireless networks are expensive to build and maintain but are best option for rural communities because of the nature of rural environments. The absence of affordable Internet services in such communities continues to impact negatively on socio-economic growth. The aim of this study was to design an enhanced wireless network for rural dwellers. Qualitative and quantitative data were collected for the design and evaluation of wireless network infrastructure in five rural locations. The results showed that for more than a year, the system performance is optimal with an average of 200 users per month and good quality of service. The transmit/receive rate of 300Mbps was three times faster than the normal Ethernet specification with an average throughput of 1 Mbps of strong signal strength. The point-to-multipoint network design increased the network throughput and the distance of signal reach and penetration, and with quality of service and affordable service.

Use and Effects of Radio Frequency Identification (RFID) Technology on Theft Detection for Library Resources Management in Two Private Universities in Abuja, Nigeria

Volume 7 Issue 2 July - September 2018

Research Paper

Use and Effects of Radio Frequency Identification (RFID) Technology on Theft Detection for Library Resources Management in Two Private Universities in Abuja, Nigeria

Yusufu Shehu Amanyi*, Philip Usman Akor**, Everest C. Madu***
*Librarian, Sunrise International School, Abuja, Nigeria.
**_***Associate Professor, Library and Information Technology, School of Information and Communication Technology, Federal University of Technology, Minna, Nigeria.
Amanyi,Y.S., Akor,P.U.,and Madu,E.C.(2018). Use and Effects of Radio Frequency Identification (RFID) Technology on Theft Detection for Library Resources Management in Two Private Universities in Abuja, Nigeria . i-manager's Journal on Wireless Communication Networks,7(2), 19-31. https://doi.org/10.26634/jwcn.7.2.15610

Abstract

The study was designed to investigate the use and effect of Radio Frequency Identification (RFID) technology on theft detection for library management in two private universities in Abuja, Nigeria. Three objectives and three research questions guided the study. The study adopted descriptive research design. The population of the study comprises of 234 postgraduate students and 9 librarians in the two private universities in Abuja metropolis. Total enumeration method was employed and a self-designed closed ended questionnaire was used to collect data from respondents. Frequency counts, tables, percentages, mean and standard deviation were used for data analysis. The results indicated that the tags, readers, handheld readers, servers, antennae, RFID label printer, and external book return kiosk were available, installed and in use in the libraries, except for handheld readers that are rarely in use. The study further revealed that despite the positive effect of RFID technology in reducing book theft in the library, much still needed to be done to revamp, upgrade and make functional RFID equipment that are obsolete as well as boost manpower development through training to enhance librarian’s productivity and efficiency in using the RFID technology to check library theft. Based on the findings it was recommended that the management of Nile University of Nigeria (NUN) and African University of Science & Technology (AUST) should invest more in other technologies to compliment RFID technology through upgrade and periodic maintenance; it also recommended that training and retraining of librarians should be advanced in the use of rarely used facilities such as handheld readers, in order to boost their morale and productivity toward a more efficient and effective service delivery.

Analysis of Mixed Strategies for P2P-TV Networks with Buffering Mechanism

Volume 7 Issue 2 July - September 2018

Research Paper

Analysis of Mixed Strategies for P2P-TV Networks with Buffering Mechanism

Adamu Aminu*, Y. V. Gaidamaka**
*Senior Lecturer, Department of Mathematics and Computer Science, Umaru Musa Yar'adua University, Nigeria.
**Professor, Department of Applied Probability and Informatics, People's Friendship University of Russia, Moscow, Russia.
Aminu,A., and Gaidamaka,Y.V .(2018). Analysis of Mixed Strategies for P2P-TV Networks with Buffering Mechanism .i-manager's Journal on Wireless Communication Networks,7(2), 10-18. https://doi.org/10.26634/jwcn.7.2.15609

Abstract

In this paper a problem of finding optimal buffer filling strategy in form of mixed strategy was considered for P2P-TV networks. In such networks, the popularly used strategies are the Rarest First (RF) and Greedy (Gr) strategies, however, studies have shown that RF strategy outperforms Gr strategy in terms of playback continuity and Gr strategy outperforms RF strategy in terms of startup delay, hence there is a need to find an optimal buffer filling strategy inform of mixed strategy with which viewers will experience better playback continuity with short startup delay. The idea of the mixed strategy is to divide the buffer with total of M buffer positions into two parts via demarcation point x, and apply one strategy to fill one part of the buffer and then the other strategy is applied to fill the other part of the buffer. For M = 40 buffer positions, an optimal demarcation point x* was found for each of the proposed mixed strategies. The results of the analysis have shown that mixed strategy where RF is firstly applied for buffer positions from m = 0,…,10, then Gr for m = 11,…,39 is the optimal strategy, with high probability of playback continuity and very low startup delay.

Coexistence of 5G and Fixed Satellite Services on MM-Wave Band

Volume 7 Issue 2 July - September 2018

Research Paper

Coexistence of 5G and Fixed Satellite Services on MM-Wave Band

S. A. Mikail*, Abdelrahim Mohamed**, Barry Evans***, Y. Ibrahim****
* Ph. D Scholar, Department of Computer Science and Engineering, Central South University, China.
** Postdoctoral Research Fellow, 5G Innovation Centre (5GIC), U.K.
*** Fellow, UK Royal Academy of Engineering and IET, United Kingdom.
****Lecturer II, Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria.
Mikail,S.A., Abdelrahim ,M., Evans B,G.,and Ibrahim ,Y.(2018). Frequency Sharing between Satellite and Terrestrial Networks .i-manager's Journal on Wireless Communication Networks,7(2), 1-9. https://doi.org/10.26634/jwcn.7.2.15605

Abstract

Addition of devices of different form factors to the network has resulted to high demand for broadband access. To improve the network capacity, Frequency spectrum regulators have recommended fifth generation (5G) network for deployment on one of the high frequency bands due to their huge contiguous bandwidth. Since such bands have already been allocated to satellite networks by the regulatory bodies, 5G must coexistence with the satellite systems. As a result, feasibility study for coexistence of 5G with the incumbent satellite systems is needed. This paper studied coexistence feasibility of a 5G terrestrial base station (BS) with fixed satellite service (FSS) terminal at 28GHz considering only interference from the satellite terminal into the 5G terrestrial BS. The study used signal to interference plus noise ratio (SINR) available at sectors of a 3-sector cell 5G terrestrial BS as a protection parameter. The available SINR on each sector was used in estimating the impact of the FSS terminal transmit power on the deployment parameters of the 5G system. Moreover, the study was conducted using a more realistic path loss model and 5G antenna pattern recently released by 3rd generation partnership project (3GPP). The results show that the transmission power and elevation angle of the FSS terminal affect deployment parameters of the 5G terrestrial BS. Finally, the results suggested that coexistence of the two systems is feasible in residential areas with only one FSS terminal if the deployment parameters of the 5G BS are carefully selected.

Managing Data Privacy in Smart Health and Smart Vehicle

Volume 7 Issue 1 April - June 2018

Review Paper

Managing Data Privacy in Smart Health and Smart Vehicle

Kahkashan Siddavatam*, Sonal Bankar**, Sulbha Yadav***
*-*** Assistant Professor, Department of Computer Engineering, Lokmanya Tilak College of Engineering, Navi Mumbai, Maharashtra, India.
Siddavatam, K., Bankar, S., Yadav, S. (2018). Managing Data Privacy in Smart Health and Smart Vehicle. i-manager's Journal on Wireless Communication Networks, 7(1), 40-46. https://doi.org/10.26634/jwcn.7.1.15319

Abstract

The services provided by multiple IoT devices require certain amount of personal information to be gathered, processed and exchanged. The personal information data can be considered as secondary data and this data generated can be sensitive in nature. Thus data privacy needs to be ensured. Different IoT domains have different methods to keep privacy of data. A security framework encompassing these domains must be created for data protection. This paper focused on some models suggested for privacy of data of certain IoT applications such as Smart Health, Smart Vehicles. Here, we analysed diverse privacy protection approaches adopted based upon dissimilar data in different IoT application domains.

Design of Hexagonal Antenna using Meander Fractal Geometry for Wideband Applications

Volume 7 Issue 1 April - June 2018

Research Paper

Design of Hexagonal Antenna using Meander Fractal Geometry for Wideband Applications

Sumeet Singh Bhatia*, Harpreet Kaur**, Shashi B. Rana***
* Research Scholar, Department of Electronics and Communication Engineering, Yadavindra College of Engineering, Punjabi University, Bathinda, Punjab, India.
** PG Scholar, Department of Communication Engineering, GNDU, Regional Campus, Gurdaspur, Punjab, India.
*** Assistant Professor, Department of Electronics and Communication Engineering, Guru Nanak Dev University Regional Campus Gurdaspur, Punjab, India.
Bhatia, S. S., Kaur, H., Rana, S. B. (2018). Design of Hexagonal Antenna using Meander Fractal Geometry for Wideband Applications. i-manager's Journal on Wireless Communication Networks, 7(1), 29-39. https://doi.org/10.26634/jwcn.7.1.15369

Abstract

A design of hexagonal antenna using Meander fractal geometry for wideband applications is investigated and presented in this paper. Partial ground plane is used in the proposed design, which is further modified by varying its length from 7mm to 10mm and it is fed by a microstrip transmission line whose width is also varied from 1mm to 1.8mm, for achieving the wideband characteristics. The overall size of proposed antenna is 44.92 × 45mm2; it operates over the frequency ranges of 2.89 – 6.09 GHz and 7.35 – 8.65 GHz, suitable for WiMAX (3.4 – 3.69 GHz), WLAN (5.15 – 5.35 GHz and 5.72 – 5.82 GHz), point to point high speed wireless communication (5.925 – 8.5 GHz) and X-band for satellite communications (7.25 – 8.39 GHz). Reasonable agreement has been reported between the simulated and measured results. Proposed antenna shows the omnidirectional and dipole-like radiation pattern at the various frequency bands and also shows the good value of gain throughout the operating frequency range. In addition, the effects of the length of partial ground plane and the width of transmission line on the performance of proposed antenna is analyzed and discussed in detail.

Performance Evaluation of Advanced Congestion Control Mechanisms for COAP

Volume 7 Issue 1 April - June 2018

Research Paper

Performance Evaluation of Advanced Congestion Control Mechanisms for COAP

Chandra Sekhar Sanaboina*, Tejeswar Eluri**
* Assistant Professor, Department of Computer Science and Engineering, JNTUK, Kakinada, Andhra Pradesh, India.
** M.Tech Student, Department of Computer Science and Engineering, JNTUK, Kakinada, Andhra Pradesh, India.
Sanaboina, C. S., Eluri, T. (2018). Performance Evaluation of Advanced Congestion Control Mechanisms for COAP. i-manager's Journal on Wireless Communication Networks, 7(1), 17-28. https://doi.org/10.26634/jwcn.7.1.14863

Abstract

In Internet of Things (IoT), the simple IPv6 capable electronic devices with limited hardware resources like memory and power resources are called constrained devices. Congestion is a major issue in network communications of these devices. To solve congestion in networks of constrained devices, Internet Engineering Task Force (IETF) had designed Constrained Application Protocol (CoAP). CoAP deals congestion with a basic Congestion Control (CC) mechanism called Default CoAP. Afterward, CoCoA and CoCoA+, an Internet-draft-recommendations, has been introduced as the elective CC mechanisms for CoAP. However, limited evaluations had done on these CC mechanisms of CoAP. In this paper, the performance evaluation of Default CoAP, CoCoA, and CoCoA+ Congestion control mechanisms are evaluated through Simulations in different network topologies and varied in different Link Delivery Ratios (LDR) of sensor nodes in constant traffic scenario by using Cooja Simulator. The simulation results are generated and CoCoA+ shows a better performance in constant traffic scenario comparing to Default CoAP and CoCoA.

Implementation of Traffic Engineering Technique in MPLS Network using RSVP

Volume 7 Issue 1 April - June 2018

Research Paper

Implementation of Traffic Engineering Technique in MPLS Network using RSVP

Nisha R.*, N. Usha Bhanu**
* M.E (Communication Systems), Department of Electronics and Communication Engineering, Valliammai Engineering College, Chennai, Tamil Nadu, India.
** Associate Professor, Department of Electronics and Communication Engineering, Valliammai Engineering College, Chennai, Tamil Nadu, India.
Nisha, R., Bhanu, U. N. (2018). Implementation of Traffic Engineering Technique in MPLS Network using RSVP. i-manager's Journal on Wireless Communication Networks, 7(1), 12-16. https://doi.org/10.26634/jwcn.7.1.15000

Abstract

This paper proposes TE (Traffic Engineering) in MPLS (Multi Protocol Label Switching) networks to provide alternate data path link when the network is congested. TE automatically creates and maintains a label switch path networks using RSVP (Resource Reservation Protocol).RSVP reserves the bandwidth along the path from the source to destination. The main novelty of this paper is implementing MPLS TE that it provides a combination of ATM's TE capabilities along the CoS (Class of service) at layer 2.5 to reduce latency and to improve the speed. The tunnel formation along the LSP (Label Switch Path) for forwarding packets and is simulated using GNS3 tool. The simulation results for MPLS network with OSPF(Open Shortest Path First ) and with two tunnels achieves a round trip time of 36milliseconds for data packet size of 8000 bytes faster than existing network with reduced latency and high speed. This paper provides backup and elimination of redundancy tunnels by implementing Fast Rerouting technique in router.

Taguchi Design of Experiments Approach to Find the Most Significant Factor of DYMO Routing Protocol in Mobile AD HOC Networks

Volume 7 Issue 1 April - June 2018

Research Paper

Taguchi Design of Experiments Approach to Find the Most Significant Factor of DYMO Routing Protocol in Mobile AD HOC Networks

P. M. Manohar*, Pallam Setty S.**
* Research Scholar, Department of Computer Science Engineering, JNTUK, Andhra Pradesh, India.
** Professor, Department of Computer Science and System Engineering, AUCE (A), Andhra University, Visakhapatnam, Andhra Pradesh, India.
Manohar, P. M., Setty, S. P. (2018). Taguchi Design of Experiments Approach to Find the Most Significant Factor of DYMO Routing Protocol in Mobile Ad Hoc Networks. i-manager's Journal on Wireless Communication Networks, 7(1), 1-11. https://doi.org/10.26634/jwcn.7.1.14971

Abstract

Mobile Ad hoc Network (MANET) attracted many proficient researchers because of its various features. In MANETs, routing is a challenging issue because of route changes and link breaks. Among the reactive routing protocols in MANETs, Dynamic MANET On-demand (DYMO) routing protocol is selected because it is scalable for larger networks and it has less routing overhead. Drawback of DYMO routing protocol is that it does not support for smaller networks with low mobility speed. In this paper, we apply Taguchi Design of Experiments approach to identify the most significant factor that enhance (Quality of Service) QoS performance of DYMO routing protocol for smaller networks with low mobility by considering Route Request Wait Time(RRWT),Route Timeout(RT), Route Request Retries(RRT)as influencing parameters of DYMO routing protocol. The impact of three influential factors on two QoS performance metrics i,e Average Throughput and Packet Delivery Ratio has been evaluated. The experiments are run on NS2 simulator and the results are analyzed through Statistical tool Minitabusing Main Effects Plot, Response Table and validated using Normal probability plot of Residuals, Residual Histogram, Residuals vs Fits, Residuals vs Order. The Route Request Wait Time (RRWT) is identified as the most significant factor among the other factors for enhancing QoS of DYMO routing protocol for smaller and medium network sizes.

Secured Wireless Transmission Protocol using NTP Server

Volume 6 Issue 4 January - March 2018

Research Paper

Secured Wireless Transmission Protocol using NTP Server

A. Karthikeyan *, S. Sai Gokul**
* Assistant Professor, Department of Electronics and Communication Engineering, SNS College of Technology, Coimbatore, Tamil Nadu, India.
** UG Scholar, Department of Electronics and Communication Engineering, SNS College of Technology, Coimbatore, Tamil Nadu, India.
Karthikeyan, A., and Gokul, S. A. (2018). Secured Wireless Transmission Protocol using NTP Server. i-manager's Journal on Wireless Communication Networks, 6(4), 38-43. https://doi.org/10.26634/jwcn.6.4.14294

Abstract

Wireless Sensor Networks (WSNs) comprises of low power, minimal effort active devices, which have restricted power sources. With a boundless development of the utilization of WSN, the security components are likewise considered to be a rising enormous issue. Wireless sensor plays a major role in collection of data in tedious areas. WSN are now widely used in collection of data such as temperature of a particular area and also plays a major role in military and agricultural purposes. The data that are transmitted over this network must be ensured for security. In this paper, the authors have discussed about the various attacks on the Wireless Sensor Network and proposed a new solution for the secure transmission of data in the sensor network using NTP server.

Impact of Mobility on Power Consumption in RPL

Volume 6 Issue 4 January - March 2018

Research Article

Impact of Mobility on Power Consumption in RPL

Chandra Sekhar Sanaboina*, Pallamsetty Sanaboina**
* Research Scholar, Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India.
** Professor, Department of Computer Science and Systems Engineering, Andhra University, Visakhapatnam, Andhra Pradesh, India.
Sanaboina, C.S., and Sanaboina, P.(2018). Impact of Mobility on Power Consumption in RPL. i-manager's Journal on Wireless Communication Networks, 6(4), 23-37. https://doi.org/10.26634/jwcn.6.4.14796

Abstract

The main theme of this paper is to implement the mobility model in Cooja simulator and to investigate the impact of the mobility on the performance of Routing Protocol over Low power Lossy networks (RPL) in the IoT environment. In the real world, mobility occurs frequently. Therefore in this paper, a frequently used mobility model - Random Way Point (RWP) is used for analysis. RWP can be readily applied to many existing applications. By default, the Cooja simulator does not support mobility models. For this, the Bonn Motion is introduced into Cooja as a plugin. As IoT deals with the resourceconstrained environment, a comparison is done between the static environment and the mobile environment in terms of power consumption. As expected, the results indicate that mobility affects the RPL in terms of Power Consumption.

DGS Based MIMO Microstrip Antenna for Wireless Applications

Volume 6 Issue 4 January - March 2018

Research Paper

DGS Based MIMO Microstrip Antenna for Wireless Applications

Shiddanagouda F.B.*, Vani R. M.**, Hunagund P. V.***
* Research Scholar, Department of Applied Electronics, Gulbarga University, Kalaburagi, Karnataka, India.
** Professor and Chairman, Department of Applied Electronics, Gulbarga University, Kalaburagi, Karnataka, India.
*** Head, University Science Instrumentation Centre, Gulbarga University, Kalaburagi, Karnataka, India.
Shiddanagouda, F. B., Vani, R. M., and Hunagund, P. V. (2018). DGS based MIMO Microstrip Antenna for Wireless Applications. i-manager's Journal on Wireless Communication Networks, 6(4), 17-22. https://doi.org/10.26634/jwcn.6.4.14576

Abstract

An octagonal split ring slot DGS (Defected Ground Structure) based MIMO (Multiple Input Multiple Output) microstrip antenna has been presented in this paper. Four ports rectangular patch elements, which are electrically small size 62.8 x 60 x 1.6 mm3 , with FR-4 substrate of dielectric constant 4.4 are proposed in the Multiple Input Multiple Output antenna. The ground plane, which is an inadequate ground structure (DGS) having a number of octagonal split ring slot DGS (OSRSDGS) windows are organised in H shape under the patch. The High-Frequency Structure Simulator (HFSS) software is used to simulate the MIMO antenna. The proposed antenna were simulated, fabricated, and measured. The proposed MIMO antenna resonates at 5.9 GHz frequency with -17.9 dB isolation with an overall bandwidth of 369 MHz. The proposed MIMO antenna results were explained in terms of reflection coefficients, data rate, Mutual Coupling Coefficients (MCC), and peak gain along with radiation pattern. The simulated and measured results give good agreement between them. The detail of the antenna design and results are presented and discussed.

Comparative Analysis Of Confinement Loss and Dispersion for Hexagonal Photonic Crystal Fiber Structure Doped with Specific Liquids

Volume 6 Issue 4 January - March 2018

Research Paper

Comparative Analysis Of Confinement Loss and Dispersion for Hexagonal Photonic Crystal Fiber Structure Doped with Specific Liquids

0*, Vikas Sahu**, Akash Joshi***
*,*** PG Scholar, Department of Electronics and Telecommunications Engineering, Shri Shankaracharya Technical Campus, Bhilai, Chhattisgarh, India.
** Assistant Professor, Department of Electronics and Telecommunications Engineering, Shri Shankaracharya Technical Campus, Bhilai, Chhattisgarh, India.
Panda, S.G., Sahu, V., and Joshi, A. (2018). Comparative Analysis of Confinement Loss and Dispersion for Hexagonal Photonic Crystal Fiber Structure Doped with Specific Liquids. i-manager's Journal on Wireless Communication Networks, 6(4), 10-16. https://doi.org/10.26634/jwcn.6.4.14233

Abstract

A comparative analysis of different parameters of a hexagonal photonic crystal fiber doped with some other liquid materials, whose refractive indices are lower than the refractive index of the actual core, has been proposed in this paper. Circular air holes are placed in four hexagonal shaped rings. Three holes from the innermost ring are filled not only with air, but also with water, ethanol, and ether to demonstrate the overall analysis of confinement loss, dispersion, and effective area. Finite Element Method is used in the software known as COMSOL Multiphysics for the calculation of effective refractive indices, while the calculation of confinement loss, dispersion and effective area, and the comparison graphs have been plotted in MATLAB. The photonic crystal fibers doped with some specific liquid can also be used for the calculation of sensitivity of that particular liquid or can be used as liquid sensors. It has been observed that the effective refractive indices and the confinement loss not only vary by changing the wavelength, but also by varying the structural parameters like pitch length and diameter of air holes. For this research work, the Perfectly Matched Layer was kept constant and the responses were calculated between diameter of holes, confinement loss, dispersion, effective area, and wavelengths.

FER Performance Analysis of Adaptive MIMO with OSTBC for Wireless Communication by QPSK Modulation Technique

Volume 6 Issue 4 January - March 2018

Research Paper

FER Performance Analysis of Adaptive MIMO with OSTBC for Wireless Communication by QPSK Modulation Technique

Sudha Arvind*, Siddapuram Arvind**
* Associate Professor, Department of Electronics and Communication Engineering, CMR Technical Campus, Hyderabad, Telangana, India.
** Professor and Dean, CMR Institute of Technology, Kandlakoya, Hyderabad, Telangana, India.
Arvind, S., and Arvind, S. (2018). FER Performance Analysis of Adaptive Mimo with OSTBC for Wireless Communication by QPSK Modulation Technique. i-manager's Journal on Wireless Communication Networks, 6(4), 1-9. https://doi.org/10.26634/jwcn.6.4.14258

Abstract

The tremendous growth in Wireless Technology in the field of communication is characterized with increased data speed with high accuracy. In order to satisfy the requirements of a data rate, it has greater complications. These requirements are conquered with Multiple-Input-Multiple-Output (MIMO) communication system. This system has multiple and certain number of transmitting and receiving antennas. Adaptive MIMO system has various conjuction of multiple transmitting and receiving antennas with Orthogonal Space Time Block Codes for encoding, which helps in improving accuracy and high data rates. Adaptive system will control with either one, two, three, or four transmit and receive antennas. The Orthogonal Space-time block coding (OSTBC) encoder by accepting Alamouti code will encode the instruction symbols from the Quadrature Phase Shift Keying (QPSK) modulator. QPSK Demodulator is used to demodulate the output of the OSTBC Combiner. The Frame Error Rate (FER) for three transmit and two receive antennas and the frame error rate for four transmit and two receive antennas is estimated. From the simulation results it is observed that the three transmit and two receive antennas are better.