An Implementation and analysis of active channel allocation (ACA) in cellular networks
By:
Muhammad Emran
The documentation for mobile communication has grown remarkably in the last few
years. An efficient allocation of communication channels is essential for ensuring
good performance of cellular networks provided the limit spectrum is available.
Previous work on load balancing in advanced mobile phone services (AMPS) cellular
networks has led to several channel allocation schemes to maximize the channel usage
and minimize the call blocking probability.
This thesis comprises of an implementation and analysis of active channel allocation
(ACA) scheme using OPNET simulator. It also consists of comparisons between fixed
channel allocation (FCA) and the developed active channel allocation (ACA) schemes.
The work in this thesis demonstration
that active channel allocation produced improved results as compared to fixed channel
allocation scheme. After the implementation of active channel allocation scheme,
the average blocking calls were reduce to reasonable level and hence serviced calls
were reduced to reasonable level and hence serviced calls were increased adequately
under the same load over the network. This proves that active channel allocation
scheme performs better than the fixed channel allocation scheme.
MPEG-4 Video Streaming Using Modified SCTP
Protocol.
By: Hafiz Muhammad Zeeshan
Hafiz Shahid Iqbal
There is a need for internetworking between telephone and computer networks. Applications
such as Voice over IP (VOIP) and the deployment of the 3rd generation
mobile telephony networks, make this
integration a necessity.
The signaling transport (SIGTRAN) working group of the Internet Engineering Task
Force (IETF) is the one in charge of the design of the standard needed to make this
internetworking possible. The primary purpose of this working group is addressing
the transport of packet-based public switched telephone network (PSTN) signaling
over IP networks, taking into account functional and performance requirements of
PSTN signaling. Among the multiple standards that have been defined by SIGTRAN there
is one new reliable transport protocol, the Stream Control Transmission Protocol
(SCTP). SCTP is the evaluation of a previous transport protocol, called the Multi-
Network Datagram Transmission Protocol (MDTP), highly based on TCP [5].
SCTP has several new features that make it more suitable for PSTN signaling transport
than TCP. SCTP can take advantage of a multi homed host using all the IP addresses
the host owns. SCTP avoids a very simple attack that affect TCP, the so called SYN
attack. This new protocol also provides a mechanism to prevent and application using
SCTP from the so called Head-Of-Line (HOL) blocking by using stream. Moreover, many
features that are optional in TCP have been including in the basic specification
of SCTP, such as the Selective Acknowledgment, the ability to tell about the receipt
of Duplicate Datagram or the support for Explicit Congestion Notification (ECN)
[2].
This thesis discusses the evaluation of the design of SCTP. We will try to explain
why the different aspects of SCTP were designed in the way they were designed and
its efficiency against other protocol suit like TCP and UDP specially when transferring
media traffic like MPEG formatting stream. When possible, we will explain how the
characteristics of SCTP evolved from the initial MDTP’s ones, and we will show how
SCTP and TCP behave in similar situations and the performance against UDP for MPEG4
video streaming in graphical representation. We will simulate the SCTP by implementing
a new algorithm to control congestion state.
Throughput Enhancement in AODV using Direction
Awareness
By:
Abdul Basit
ADHOC wireless networks are self organizing multi-hop wireless networks where all
nodes take part in the process of forwarding packets [1]. MANETs consist of mobile
nodes, which communicate via wireless means and perform the tasks of both hosts
and routers. MANETs do not have a centralized controller, nor do they require any
infrastructure, that is why MANETs are also known as infrastructure- less networks
[2]. The network topology of MANETs is dynamic as mobile nodes are free to move
around and can even freely leave or join the network. Dynamic and free movement
of MNs in MANETs causes lack of link stability; this is major problem because of
which this topic has been adopted to enhance the throughput using weighted mobility
awareness factors. The purpose of this thesis is to improve performances of OADV
by presenting a novel scheme called direction Awareness. This scheme is based on
based on weighted measurement of two mobility
factors i.e. direction and distance
for a best node. Based on these weights play an important role to select best route
using est node that sustains for longer period of time, resulting in high throughput
and less delays that enhance performance of AODV networks.
PERSISTENT PACKET REORDERING LEADING TO DENIAL-OF-SERVICE
ATTACK IN TCP BASED AD HOC WIRELESS NETWORKS
By:
Amjad Ali
The transmission control protocol (TCP) is the most predominant transport layer
protocol in the internet today. It transport majority of the traffic on the internet.
TCP in its traditional form was design and optimized for wired networks. In traditional
TCP Packet loss is mainly attributed to the network congestion in which TCP transmitter
invokes congestion avoidance and error recovery mechanisms which reduce its congestion
window size. In TCP persistent packet reordering attack, The malicious nodes persistently
reorder packets after placing them into reordered buffer rather than placing into
FIFO buffer. The TCP receiver generates DUPACKs on receipt of out-of-order packets.
The problem arise when TCP transmitter misinterprets these DUPACKs as packet loss
and invokes its congestion avoidance avoidance mechanisms which reduces its congestion
window size unnecessarily and generate large number of unnecessary transmission.
Thus, this persistent packet reordering will result in near zero good put, Instead
of all transmission packets has been delivered.
The objective of this thesis is to analyze the behavior of congestion window size
of standard TCP and many other variants of TCP such as TCPReno, TCPNewreno, TCPSack1,
TCPVegas, TCPRbp and TCPFack with different ad hoc routing protocols such as AODV
and DSR under persistent packet reordering attack as a case study we have analyzed
the state transition diagram for TCPReno by Katsuhiro et al, and show how this TCP
variant misinterprets packet reordering with packet loss, in order to handle such
misinterprets packet reordering with packet loss. In order to handle such misinterpretations,
we have introduced two new states in TCPReno. The state “Rf” eliminates the retransmission
ambiguity that is due to receipt of three successive DUPACKs and “Rw+f+0” eliminates
the spurious timeout ambiguity that is due to the receipt of DUPACKs less than three.
These two new states prevent TCPReno to reduce its congestion window size unnecessarily
when retransmissions are due to persistent packet reordering attack rather than
packet loss.
This thesis comprises of an implementation of persistent packet reordering attack
under standard TCP and analysis of this attack under various TCP variants by using
different ad hoc routing protocols such as AODV and DSR through NS-2 simulator.
An analytical solution is proposed to handle said attack in TCPReno.
CONGESTION DETECTION AND AVOIDANCE AT MAC LAYER IN DSR
By:
M Sajid Qayyum
The channel reliability and congestion has many facets and encompasses more than
the packet routing and delivery of the packets. In wireless ad hoc network congestion
causes overall channel quality to degrade and increase in loss rate, Increase in
delay, retransmission, flooding, channel access contention, decrease in throughput
of networks and increase in transmission interface queue length. A large number
of reactive and proactive protocols have been proposed in recent years to control
congestion at different layers. The media access control (MAC) layer plays a key role in determining the channel usage efficiency by resolving contention, transmission
from independent nodes separated in time and space. The IEEE 802.11 MAC contention
based protocols help to mitigate congestion in ad hoc wireless networks to a large
extent by channel reservation it avoids hidden node and exposed terminal problems.
By local monitoring of the network interface transmission queue length and MAC layer
behavior at each node can make a decision about the channel condition around it.
To improve quality of service, MAC layer fragmentation and De-Fragmentation is important,
that can be used by devising adaptive algorithms. Buffer occupancy and packet drop
rate are the major parameters effecting congestion.
The proposed Congestion Aware Nodes (CAN) based scheme improves working of Dynamic
Source Routing (DSR) for congestion at MAC layer. In this scheme congestion is detected
by using different MAC layer parameters i.e. queue delay, packet retransmission
and MAC overhead. These parameters are used by DSR to select less congested link
at the routing layer. The simulation results how that proposed scheme works well
in a congested network with less retransmissions, low packet loss, less delay and
higher through put.
IMPLEMENTATION OF PRIORITY BASED SCHEDULING USING FPGA
By:
Kamran Yousaf
Packet scheduling technique to be used is very crucial to provide the quality of
service. This thesis implements a router scheduler in programmable logic using Xilinx
FPGA (Spartan 3). The FPGA’s are configurable, reprogrammable and can be designed
in no time. FPGA allow customizable and easy modifications of the hardware design.
While router at its input ports receiving packets and putting them in packet buffer,
some parameters (type of service, Packet length, and source IP address) that are
present in packet header are examined and the priority is calculated based on these
parameters. Priority calculated for each packet tells that how early that packet
would be transmitted. When the packet is being placing at packet buffer the request
that denotes the buffer location and packet priority is sent to priority queue.
Priority holds the request in such fashion that the request with priority 1 will
be completed first. The priority is controlled by scheduler. The scheduler is responsible
to putting requests into queue and getting request out of queue. The scheduler fetches
the packet from the packet buffers according to priority queue and then sends the
packet out of router accordingly. Scheduler is responsible for maintaining QOS (Quality
of service) so that the data which needs to transmit immediately or that does not
compromise delay must be forwarded immediately without any delay. Today in modern
communication world, the traffic that exists in the internet is becoming more and
more abnormal. This is mainly due to increase in number of users. The most efficient
solution to this problem is to manage and allocates the bandwidth using suitable
queuing. QAS (Query of Service) means satisfying customer requirements. Objective
is to implement real-time packet scheduling algorithm to ensure quality of service
(QAS) for different data streams. The router used in this thesis receives or send
data parallel. Parallel processing is a technique for improving the performance
of computers. The functional description of the router scheduler has been written
in the VHDL (Very High Speed Integrated Circuits hardware description language).
The fundamental motivation to use VHDL (or its competitor, Verilog) is that VHDL
is standard, Technology/ Vendor independent language. The VHDL can bee compiled
into a gate level model using hardware synthesis tools.
Implementation of Constraint Based Routing using FPGA
By:
Muhammad Iqbal
Field Programmable Gate Array (FPGA) devices offer a large set of advantages due
to their-r-configurable nature. Although their performance is not comparable to
ASIC devices, their-flexibility is usually more important especially when fast time-to-market
is an issue. For that reason they are widely used in electronic applications both
during prototyping but also for final-production systems. Computer networks are
undoubtedly one of the most demanding areas where flexibility and cost are of significant
importance.
The aim of the current thesis is the design and implementation of an FPGA-based
constraint based routing. Constraints are the set of values that the link have.
For example a matrix, this contains the cost, bandwidth, delay, number of hope counts,
and many.
Constraint based routing (CBR) denotes a class of routing algorithms that base path
selection decisions o a set of requirements or constraints, in addition to the destination.
In the proposed design these constraints are implemented on the hardware level and
all the incoming packets are forwarded on the basis of the constraints.
This will help to maintain the QoS as well as the policy based communication. That
means that the final product is a low-cost device can be used from a typical LAN
to a more advanced wireless network.
An Analysis and Implementation of Trust Awareness
in AODV Routing
By:
Rizwan Qureshi
Security is essential whether in wired networks or in
Mobile
Ad hoc Networks (MANETs). In fact it is more necessary in the inherently unsecured
MANETs. Nodes join and leave a MANET randomly and there is no way to identify what
type of node will be joining. A malicious node joining a MANET can cause havoc.
To secure a MANET against attacks by malicious nodes we need to exclude them from
any route that a data packet may take. We can define trust levels for each node
and dynamically update them according to some metric. Then only nodes which meet
a certain criterion are allowed to participate in a route otherwise they are excluded.
Simulating the model shows that trust level are a good way to prevent malicious
nodes from becoming a part of any route. This helps the efficiency of the network
by allowing the maximum number of packets to reach the intended destination.
VPN Technologies Performance Analysis
By:
Rukhsana Rahim Butt
VPN is being thought off a substitute emerged and professed technology of IEEE 802.1x
devices for wireless LAN security due to prevailing vulnerabilities in it
to avoid
extensive configuration, maintenance and finance. Moreover, 802.1x devices are not
easily accessible.
Analysis of existing technologies prior to their development is a crucial one that
can yield progressive growth/throughput to the organization in case of security
and performance. The aim of this thesis is to quantity the impact of various VPN
tunnel types on the network performance.
This study comprise of issues related to IEEE 802.11b, pointed out two methods to
secure WLAN i.e. 802.1x and VPN, comparison between different tunneling protocols
to emulate the pleasures with wired technologies.
RFC 2764 is selected to model and simulate two L2TP tunneling types; voluntary and
compulsory. I have followed qualitative and quantitative approach to accomplish
my thesis on analysis on various tunnel types for security and performance.
Various tests are conducted on real and non-real applications to check the strengths
and weaknesses against each application. This study can help in guiding the service
providers and network managers to decide which VPN solution is the right one to
use.
An investigation into digital access cross
connect system
By:
Salman Tariq
This investigation provides technical information address in DACS. It is designed
for use in conjunction with other DACS documents or as a stand alone reference.
Data communications technologies are evolving and expanding at ana unparalleled
rate. The growth in demand for internet access and intranet services continues to
fuel rapid technical adaptation by both implementers and developers. Unfortunately,
creating an information resource such as the investigation on DACS requires certain
recognition by its author that some information is likely to be obsolete the day
it appears in print.
The project is adopted with intention to give myself a brief introduction in the
field of communication. The project provides a comprehensive introduction to the
study of DACS. It presents elementary information for Tellabs and Alcatle (New bridge).
And special research is made on NMS, that how NMS is controlling Tellabs and Alcate(Newbridge).
In end I have given my own comments about Tellabs and Alcate regarding their working.
Quality of Serviced based routing for AD-HOC
networks using AODV
By:
Salman Akhtr Cheema
Mobile Ad Hoc Networks (MANETs) are multi-hop ad hoc wireless networks with no infrastructure.
Network topology of MANETs is dynamic as mobile nodes are free to move around and
can even freely leave or join the network. Each Mobile Node (MN) acts either as
a host generating flows or as the destination of flows form other MNs or as a router
forwarding flows directed to other MNs. Protocol defined for ad hoc networks are
classified as reactive protocols. Reactive protocols are characterized by MNs maintaining
routes on demand; examples are AODV and DSR (Dynamic Source Routing).
The aim of this project is to improve performance of AODV in multi-hop environments
by finding optimal route to the destination. The idea is to find best nodes in the
direction of destination. All nodes in the network broadcast their current location
to their neighboring nodes periodically within its radio range. Using this location
information every node finds its best neighbor by assigning weights to its all neighbors
with respect to direction and distance in its radio range. This process continues
until a data packet reached to the destination. In this scheme best neighbors are
selected to establish an optimal path to the destination and the path remains stable
for longer period.
An analysis of security of AODV routing and
implementation of trust establishment of neighboring Nodes
By:
Hasnain Ahamd
A mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes (hosts)
forming a temporary network without the help of any established infrastructure or
centralized administration. Security of routing protocol in MANET is today a major
issue. Correct functioning of MANET can only be
guaranteed through reliable routing
operation. Here, the security threats against AODV (the most widely used routing
protocol in MANETs) protocol and their countermeasures are discussed in detail.
Also, a model for establishing trust of neighboring nodes (the nodes that are directly
in the radio range of a given node) is proposed and implemented. The proposed model
calculates the trust levels of neighboring nodes. These trust levels provide a node
the basis for more certain opinions about its neighbors. Using these trust levels
a node can choose better neighbors (next hope) in future routes.
HL7 messaging and analysis of transport specifications
in health informatics
By:
Saira Ilyas
Healthcare is of great importance of any country, and so is for
Pakistan
. Unfortunately, majority of care domains in
Pakistan
are operating at a sub-optimal level, as the use of information Systems is almost
non-existent. An utmost need is to improve the current healthcare services by introducing
information Technology. In the absence of a proper enterprise Resource Planning,
most of the health care amenities, particularly in government sector, are lacking
the best possible outcome. I have proposed the HL7 standard complaint applications
for the health care in
Pakistan
that also incorporates other standards as LONIC, DICOM, ICD-10 and ISO-3166 in it.
Also I have analyzed the network performance for transporting the HL7 messages according
to the protocols suggested by the HL 7 organization as SSL, HTTP, SMTP and ebXML.
Improving AODV performance using mobility
awareness
By:
Khawar Mahmood
A mobile as hoc network is a collection of wireless nodes, all of which may be mobile,
that dynamically create a wireless network amongst them without using any infrastructure.
Ad hoc wireless networks come into being solely by peer-to-peer interactions among
their constituent mobile nodes, and it is only such interactions that are used to
provide the necessary control and administrative functions supporting such networks.
Mobile hosts are no longer just end systems: each node must be able to function
as a router as well to ralay packets generated by other nodes. As the nodes move
in and out of range with respect to other nodes, including those that are operating
as routers, the resulting topology changes must somehow be communicated to all other
nodes as appropriate. In accommodating the communication needs of the user applications,
the limited bandwidth of wireless channels and their generally hostile transmission
characteristics impose additional constraints on how much administrative and control
information may be exchanged, and how often. Ensuring effective routing is one the
greatest challenges for ad hoc networking.
Pear-to-pear data sharing in IMS (IP Multimedia
subsystem)
By:
Lubna Javaid
The title of the project is “IMS (IP Multimedia Subsystem) and P2P data sharing
“. The discussion is on IMS technologies, P2P data sharing in IMS and their impact.
IMS is defined by 3GPP as a new subsystem, i.e. a new mobile network infrastructure
that enables the convergence of data, speech and mobile network technology over
an IP-based infrastructure. Peer-to-peer (P2P) systems are self organizing architectures,
independent of any infrastructure. Self organized makes them robust and flexible
to dynamic changes without provider interaction. We will argue that how a user can
share applications and data residing on their UEs in IMS by implementing a virtual
network, which will enhance the IMS architecture by the implementation of new software
logical components and will consequently enhance the services offered by IMS to
its subscribers.
The aim of this study is to throw light on the dilemma which has not yet been focused
in IMS. Currently, IMS does not support and P2P services.
Saturation throughput analysis of IEEE 802
11 e EDCA through an analysis model
By:
Rabia Mahmood
IEEE 802 11 is the most widely used standard in wireless local area networks. It
has been recently enhanced in the form of IEEE 802. 11e to provide better support
for Quality of service since existing wireless networks have significantly lower
bandwidth than the networks with which they are integrated, they easily become the
bottleneck for the traffic flow and may get saturated quite often. A number of works
have focused on calculating the throughput and delay performance of IEEE 802. 11and
the IEEE 802 11e wireless networks The existing models for saturation throughput
analysis have some nor do they provide a closed form solution for the performance
parameters. Bianchi [2] modeled the binary exponential back off process used by
IEEE 802.11 networks, using a two-dimensional Markov chain. Later, many researchers
have modified Bianci’s model to incorporate more and more details of the IEEE 802.11
protocol in order to make it more accurate. This model has also been modified for
the analysis of IEEE 802.11 by incorporating AIFS and contention window differentiation.
However the models found for IEEE 802.11 do not cover the back off freezing due
to EIFS which significantly affects the accuracy and correctness of the model. One
model [9] that covers EDCA post-collision back off, models EIFS outside the two
dimensional Markov model and hence it does not provide a closed form solution. In
this thesis, we modify and existing analytical model [12] by including EIFS as defined
in the IEEE 802.11e standard. We derive saturation throughput results analytically
and verify out results with simulations.
|