A Network Simulator to Develop Wireless Networking Protocols Suited for Vital Information Collection from a Group of Exercisers

Author(s):  
Hirofumi Ogura ◽  
Takuma Hamagami ◽  
Ryusuke Miyamotov ◽  
Hiroyuki Yomo ◽  
Shinsuke Hara
Sensors ◽  
2019 ◽  
Vol 19 (23) ◽  
pp. 5168 ◽  
Author(s):  
Chaohui Luo ◽  
Biyun Ma ◽  
Fangjiong Chen ◽  
Quansheng Guan ◽  
Hua Yu ◽  
...  

Software-defined acoustic modems (SDAMs) for underwater communication and networking have been an important research topic due to their flexibility and programmability. In this paper, we propose a reconfigurable platform for SDAMs based on the TI AM5728 processor, which integrates dual-core ARM Cortex-A15 CPUs and two TI C66x DSP cores. The signal processing and A/D, D/A for physical-layer communication are implemented in the DSP cores. The networking protocols and the application programs are implemented in the ARM cores. The proposed platform has the following characteristics: (1) Due to the high-performance dual-ARM cores, the whole NS3 network simulator can be run in the ARM cores. Network protocols developed in a software simulation platform (e.g., NS3 platform) can be seamlessly migrated to a hardware platform without modification. (2) A new physical-layer module associated with real acoustic channel is developed, such that a data packet generated from the application layer will be transmitted through a real acoustic channel. The results of networking experiments with five nodes are presented to demonstrate the effectiveness of the proposed platform.


Author(s):  
Dr. A. Pasumpon Pandian ◽  
Dr. Smys S.

Nowadays to increase the efficiency, consistency and the quality of the organizations and to further extend the business world wide the digitization is followed in processing, storing and conveying the information. This in turn has also caused huge set of data flow paving way for the data recovery services. The cloud computing with the massive storage capabilities have become a predominantly used paradigm for data storage and recovery due to its on demand network access, elasticity, flexibility and pay as you go. Moreover to secure the information that is stored the information’s are fragmented and stored. However this fragmentation process often occurs in the form of dispersed and scattered packages lacking proper order heightening the time and minimizing the efficiency of the recovery and information collection. To bring down the restoration time and enhance its efficiency the proposed method in the paper tries to reduce the fragmentation by minimizing the number of dispersed and scattered packages for this the paper utilizes the Hybridized Historical aware algorithm (HHAR) along with the cache aware filter to gather the historical information’s associated with the back-up system and the identify the out of order containers respectively. Further the every data package is protected applying the advanced encryption standard by producing a key to authenticate the access of the data. The proposed model is simulated using the network simulator-II and the results obtained shows that the recovery time is enhanced by 95% and the restore performance is improved by 94.3%.


2011 ◽  
Vol 3 (6) ◽  
pp. 87-90
Author(s):  
O. H. Abdelwahed O. H. Abdelwahed ◽  
◽  
M. El-Sayed Wahed ◽  
O. Mohamed Eldaken

Author(s):  
Chaithra. H. U ◽  
Vani H.R

Now a days in Wireless Local Area Networks (WLANs) used in different fields because its well-suited simulator and higher flexibility. The concept of WLAN  with  advanced 5th Generation technologies, related to a Internet-of-Thing (IOT). In this project, representing the Network Simulator (NS-2) used linked-level simulators for Wireless Local Area Networks and still utilized IEEE 802.11g/n/ac with advanced IEEE 802.11ah/af technology. Realization of the whole Wireless Local Area Networking linked-level simulators inspired by the recognized Vienna Long Term Evolution- simulators. As a outcome, this is achieved to link together that simulator to detailed performances of Wireless Local Area Networking with Long Term Evolution, operated in the similar RF bands. From the advanced 5th Generation support cellular networking, such explore is main because different coexistences scenario can arise linking wireless communicating system to the ISM and UHF bands.


2012 ◽  
Vol 3 (3) ◽  
pp. 354-358
Author(s):  
Dr Gunmala Suri ◽  
Sneha Sharma

The purpose of this research is to investigate and understand how students are using computer. The activities that a student undertakes with the help of computers which might be fulfilling some academic or non academic purpose, is of great interest. It will help in understanding the limitations and potentials offered by the technology for use of computer in classroom. This paper brings out the three major kinds of activities that students undertake with computer; self learning activities, Information collection tasks and communication and group activities. The study further analyses the effect of demographics i.e. gender, age and faculty (department) of students on the activities with computer. The results show that gender has no impact on the activities of students with computer. The age impacts only the activities related to Information collection by using computer where as the faculty of student significantly impacts all the activities viz. self learning activities, Information collection tasks and communication and group activities. The findings from this research can be used in designing future e-learning initiatives and development e-learning tools


Sign in / Sign up

Export Citation Format

Share Document