Search results
1 – 10 of 766Eric Hsiao‐Kuang Wu and Yu‐Chen Cheng
Emerging real‐time multimedia services over IP have penetrated into the daily lives of normal people with the advent of advanced broadband communications and innovated…
Abstract
Purpose
Emerging real‐time multimedia services over IP have penetrated into the daily lives of normal people with the advent of advanced broadband communications and innovated interconnection technologies. To protect shared Internet from unfairness and further congestion collapse, rate control plays a crucial role for many multimedia services such as streaming applications. Streaming applications such as video on demand (VoD) or voice over IP (VoIP) services face some critical problems such as insufficient bandwidth and improper performance of transmission protocols. Besides, the new generation networks are anticipated to integrate all heterogeneous wired and wireless networks and offer seamless customized multimedia services anywhere, anytime. However, wireless networks usually with low and variable bandwidth, and non‐congestion related loss do bring the challenge to the existing transport protocol, such as TCP, TFRC etc.
Design/methodology/approach
The paper uses simulations and compares other methods. The purpose of this paper is to address these issues. The paper, proposes a rate control scheme named Jitter‐based Rate Control (JRC) to fit wired‐wireless hybrid network which has better performance than the current rate control scheme.
Findings
Extensive simulations and comparisons with other methods verify the effectiveness of our method for accurate and smooth estimation, no matter whether the wireless links are located.
Originality/value
The paper introduces the JRC.
Details
Keywords
Mohammed S. Al-kahtani, Lutful Karim and Nargis Khan
Designing an efficient routing protocol that opportunistically forwards data to the destination node through nearby sensor nodes or devices is significantly important for an…
Abstract
Designing an efficient routing protocol that opportunistically forwards data to the destination node through nearby sensor nodes or devices is significantly important for an effective incidence response and disaster recovery framework. Existing sensor routing protocols are mostly not effective in such disaster recovery applications as the networks are affected (destroyed or overused) in disasters such as earthquake, flood, Tsunami and wildfire. These protocols require a large number of message transmissions to reestablish the clusters and communications that is not energy efficient and result in packet loss. This paper introduces ODCR - an energy efficient and reliable opportunistic density clustered-based routing protocol for such emergency sensor applications. We perform simulation to measure the performance of ODCR protocol in terms of network energy consumptions, throughput and packet loss ratio. Simulation results demonstrate that the ODCR protocol is much better than the existing TEEN, LEACH and LORA protocols in term of these performance metrics.
Details
Keywords
George Exarchakos, Luca Druda, Vlado Menkovski and Antonio Liotta
This paper aims to argue on the efficiency of Quality of Service (QoS)-based adaptive streaming with regards to perceived quality Quality of Experience (QoE). Although QoS…
Abstract
Purpose
This paper aims to argue on the efficiency of Quality of Service (QoS)-based adaptive streaming with regards to perceived quality Quality of Experience (QoE). Although QoS parameters are extensively used even by high-end adaptive streaming algorithms, achieved QoE fails to justify their use in real-time streaming videos with high motion. While subjective measurements of video quality are difficult to be applied at runtime, objective QoE assessment can be easier to automate. For end-to-end QoS optimization of live streaming of high-motion video, objective QoE is a more applicable approach. This paper contributes to the understanding of how specific QoS parameters affect objective QoE measurements on real-time high-motion video streaming.
Design/methodology/approach
The paper approached the question through real-life and extensive experimentation using the Skype adaptive mechanisms. Two Skype terminals were connected through a QoS impairment box. A reference video was used as input to one Skype terminal and streamed on one direction. The impairment box was stressing the stream with different conditions. Received video was stored and compared against the reference video.
Findings
After the experimental analysis, the paper concludes that adaptive mechanisms based on QoS-related heuristics fail to follow unexpected changes to stream requirements. High-motion videos are an example of this variability, which makes the perceived quality sensitive to jitter more than to packet loss. More specifically, Skype seems to use if-else heuristics to decide its behavior to QoS changes. The weaknesses to high-motion videos seem to lie on this rigidity.
Research limitations/implications
Due to the testbed developed, the results may be different if experiments are run over networks with simultaneous streams and a variety of other traffic patterns. Finally, other streaming clients and algorithms would contribute to a more reliable generalization.
Practical implications
The paper motivates video streaming engineers to emphasize their efforts toward QoE and end-to-end optimization.
Originality/value
The paper identifies the need of a generic adaptive streaming algorithm able to accommodate a big range of video characteristics. The effect of QoS variability to high-motion video streaming helps in modeling and design.
Details
Keywords
Mohandas V. Pawar and Anuradha J.
This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here…
Abstract
Purpose
This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here, different phases are included such as assigning the nodes, data collection, detecting black hole and wormhole attacks and preventing black hole and wormhole attacks by optimal path communication. Initially, a set of nodes is assumed for carrying out the communication in WSN. Further, the black hole attacks are detected by the Bait process, and wormhole attacks are detected by the round trip time (RTT) validation process. The data collection procedure is done with the Bait and RTT validation process with attribute information. The gathered data attributes are given for the training in which long short-term memory (LSTM) is used that includes the attack details. This is used for attack detection process. Once they are detected, those attacks are removed from the network using the optimal path selection process. Here, the optimal shortest path is determined by the improvement in the whale optimization algorithm (WOA) that is called as fitness rate-based whale optimization algorithm (FR-WOA). This shortest path communication is carried out based on the multi-objective function using energy, distance, delay and packet delivery ratio as constraints.
Design/methodology/approach
This paper implements a detection and prevention of attacks model based on FR-WOA algorithm for the prevention of attacks in the WSNs. With this, this paper aims to accomplish the desired optimization of multi-objective functions.
Findings
From the analysis, it is found that the accuracy of the optimized LSTM is better than conventional LSTM. The energy consumption of the proposed FR-WOA with 35 nodes is 7.14% superior to WOA and FireFly, 5.7% superior to grey wolf optimization and 10.3% superior to particle swarm optimization.
Originality/value
This paper develops the FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN. To the best of the authors’ knowledge, this is the first work that uses FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN.
Details
Keywords
Souad El Houssaini, Mohammed-Alamine El Houssaini and Jamal El Kafi
In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly…
Abstract
Purpose
In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network.
Design/methodology/approach
This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (Sr) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model.
Findings
The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is Sr, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack.
Originality/value
According to the best of the authors’ knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.
Details
Keywords
Kotaru Kiran and Rajeswara Rao D.
Vertical handover has been grown rapidly due to the mobility model improvements. These improvements are limited to certain circumstances and do not provide the support in the…
Abstract
Purpose
Vertical handover has been grown rapidly due to the mobility model improvements. These improvements are limited to certain circumstances and do not provide the support in the generic mobility, but offering vertical handover management in HetNets is very crucial and challenging. Therefore, this paper presents a vertical handoff management method using the effective network identification method.
Design/methodology/approach
This paper presents a vertical handoff management method using the effective network identification method. The handover triggering schemes are initially modeled to find the suitable position for starting handover using computed coverage area of the WLAN access point or cellular base station. Consequently, inappropriate networks are removed to determine the optimal network for performing the handover process. Accordingly, the network identification approach is introduced based on an adaptive particle-based Sailfish optimizer (APBSO). The APBSO is newly designed by incorporating self-adaptive particle swarm optimization (APSO) in Sailfish optimizer (SFO) and hence, modifying the update rule of the APBSO algorithm based on the location of the solutions in the past iterations. Also, the proposed APBSO is utilized for training deep-stacked autoencoder to choose the optimal weights. Several parameters, like end to end (E2E) delay, jitter, signal-to-interference-plus-noise ratio (SINR), packet loss, handover probability (HOP) are considered to find the best network.
Findings
The developed APBSO-based deep stacked autoencoder outperformed than other methods with a minimal delay of 11.37 ms, minimal HOP of 0.312, maximal stay time of 7.793 s and maximal throughput of 12.726 Mbps, respectively.
Originality/value
The network identification approach is introduced based on an APBSO. The APBSO is newly designed by incorporating self-APSO in SFO and hence, modifying the update rule of the APBSO algorithm based on the location of the solutions in the past iterations. Also, the proposed APBSO is used for training deep-stacked autoencoder to choose the optimal weights. Several parameters, like E2E delay, jitter, SINR, packet loss and HOP are considered to find the best network. The developed APBSO-based deep stacked autoencoder outperformed than other methods with minimal delay minimal HOP, maximal stay time and maximal throughput.
Details
Keywords
R. Srilakshmi and Jayabhaskar Muthukuru
The mischievous nodes that defy the standard corrupt the exhibition of good nodes considerably. Therefore, an intrusion discovery mechanism should be included to the mobile ad-hoc…
Abstract
Purpose
The mischievous nodes that defy the standard corrupt the exhibition of good nodes considerably. Therefore, an intrusion discovery mechanism should be included to the mobile ad-hoc network (MANET). In this paper, worm-hole and other destructive malignant attacks are propelled in MANET.
Design/methodology/approach
A wireless ad-hoc network also called as mobile ad-hoc network (MANET) is a gathering of hubs that utilizes a wireless channel to exchange information and coordinate together to establish information exchange among any pair of hubs, without any centralized structure. The security issue is a major difficulty while employing MANETs.
Findings
Consequently, the attacks due to the malicious node activity are detected using Hybrid Reactive Search and Bat (HRSB) mechanism to prevent the mischievous nodes from entering the network beneath the untruthful information. Moreover, the attack detection rate and node energy are predicted for determining the lifetime of the node.
Originality/value
The simulation outcomes of the proposed HRSB technique are evaluated with the prevailing methods. The comparison studies have proven the efficacy of the current research model by attaining high attack detection rate and achieving more network lifetime.
Details
Keywords
Neha Jain, Ashish Payal and Aarti Jain
The purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which…
Abstract
Purpose
The purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which routing protocol is best for application throughput, application delay and network link parameters for different packet sizes. As the routing protocol is used to select the optimal path to transfer data packets from source to destination. It is always important to consider the performance of the routing protocol before the final network configuration. From the literature, it has been observed that RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) are the most popular routing protocols, and it has always been a challenge to select between these routing protocols, especially for hybrid networks. The efficiency of routing protocol mainly depends on resulting throughput and delay. Also, it has been observed that data packet size also plays an essential role in determining the efficiency of routing protocol.
Design/methodology/approach
To analyse the effect of different packet sizes using two routing protocols, routing information protocol (RIP) and open shortest path first (OSPF) on the hybrid network, require detailed planning. Designing the network for simulate and then finally analysing the results requires proper study. Each stage needs to be understood well for work accomplishment. Thus, the network’s simulation and evaluation require implementing the proposed work step by step, saving time and cost. Here, the proposed work methodology is defined in six steps or stages.
Findings
The simulation results show that both routing protocols – RIP and OSPF are equally good in terms of network throughput for all different packet sizes. However, OSPF performs better in terms of network delay than RIP routing protocol in different packet size scenarios.
Research limitations/implications
In this paper, a fixed network of 125 objects and only RIP and OSPF routing protocol have been used for analysis. Therefore, in the future, a comparison of different network sizes can be considered by increasing or decreasing the number of objects in the proposed network. Furthermore, the other routing protocols can be used for performance evaluation on the same proposed network.
Originality/value
The analysis can be conducted by simulation of the network, enabling us to develop a network environment without restricting the selection of parameters as it minimizes cost, network deployment overhead, human resources, etc. The results are analysed, calculated and compared for each packet size on different routing protocol networks individually and the conclusion is made.
Details
Keywords
Notes that cellular is the inevitable future architecture for the personal communication service system (PCS). This is important for wireless mobile communications and will…
Abstract
Notes that cellular is the inevitable future architecture for the personal communication service system (PCS). This is important for wireless mobile communications and will eventually be integrated with the Internet. Recent initiatives to add mobility to the Internet and packet data services for the next generation cellular systems are being considered by many mobile service providers, and providing a seamless support for IP‐based packet switched services is an important issue. Mobile Internet Protocol version 6 (Ipv6) is a new version of the Internet Protocol that was standardized by the Internet Engineering Task Force (IETF). It supports mobility and is presently being standardized by the IETF Mobile IP Working Group. Discusses the current cellular support based on Ipv6 and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high speed mobile station moving among small wireless cells.
Details
Keywords
The purpose of this paper is to propose a four‐level hierarchy model for multimedia documents representation to be used during the dynamic scheduling and altering of multimedia…
Abstract
Purpose
The purpose of this paper is to propose a four‐level hierarchy model for multimedia documents representation to be used during the dynamic scheduling and altering of multimedia contents.
Design/methodology/approach
The four‐level hierarchy model (object, operation, timing, and precedence), offers a fine‐grain representation of multimedia contents and is embedded within a research tool, which is called WEBCAP. WEBCAP utilizes the four‐level hierarchy to synchronize the retrieval of objects in the multimedia document employing Allen's temporal relations, and then applies the Bellman‐Ford's algorithm on the precedence graph to schedule all operations (fetch, transmit, process, and render), while satisfying the in‐time updating and all web workload's resources constraints.
Findings
The experimental results demonstrate the effectiveness of the model in scheduling the periodical updating multimedia documents while considering a variety of workloads on web/TCP.
Research limitations/implications
WEBCAP should be enhanced to automatically measure and/or approximate the available bandwidth of the system using sophisticated measurement of end‐to‐end connectivity. In addition, WEBCAP should be expanded and enhanced to examine system infrastructure for more real‐time applications, such as tele‐medicine and e‐learning.
Practical implications
WEBCAP can be used as an XML markup language for describing multimedia presentations. It can be used to create online presentations similar to PowerPoint on desktop environment, or used as an interactive e‐learning tool. An HTML browser may use a WEBCAP plug‐in to display a WEBCAP document embedded in an HTML/XML page.
Originality/value
This paper proposed a dynamic scheduling of multimedia documents with frequent updates taking into consideration the network's workload to reduce the packet lost ratio in the TCP flow, especially in the early stages. WEBCAP can be used to guide distributed systems designers/managers to schedule or tune their resources for optimal or near optimal performance, subject to minimizing the cost of document retrieval while satisfying the in time constraints.
Details