scholarly journals Performance Analysis of Stationary and Deterministic AODV Model

Author(s):  
Kothai G ◽  
Poovammal E

Vehicular Adhoc Network (VANET) is an emerging technology that provides a digital communication among vehicles, persons and Road-Side Units (RSU). VANETs are highly vulnerable to cyber-attacks. These cyber-attacks make a wrong illusion on traffic jam, can inject false information regarding traffics and injects large amount of spam messages that disrupts the normal functionalities. The main objective of the research work is to implement and analyze the different models that help in improving the traffic management. The scenarios are simulated, and the performance is analyzed using the OMNET++ Simulator<strong>.</strong>

Author(s):  
Simar Preet Singh ◽  
Rajesh Kumar ◽  
Anju Sharma ◽  
S. Raji Reddy ◽  
Priyanka Vashisht

Background: Fog computing paradigm has recently emerged and gained higher attention in present era of Internet of Things. The growth of large number of devices all around, leads to the situation of flow of packets everywhere on the Internet. To overcome this situation and to provide computations at network edge, fog computing is the need of present time that enhances traffic management and avoids critical situations of jam, congestion etc. Methods: For research purposes, there are many methods to implement the scenarios of fog computing i.e. real-time implementation, implementation using emulators, implementation using simulators etc. The present study aims to describe the various simulation and emulation tools for implementing fog computing scenarios. Results: Review shows that iFogSim is the simulator that most of the researchers use in their research work. Among emulators, EmuFog is being used at higher pace than other available emulators. This might be due to ease of implementation and user-friendly nature of these tools and language these tools are based upon. The use of such tools enhance better research experience and leads to improved quality of service parameters (like bandwidth, network, security etc.). Conclusion: There are many fog computing simulators/emulators based on many different platforms that uses different programming languages. The paper concludes that the two main simulation and emulation tools in the area of fog computing are iFogSim and EmuFog. Accessibility of these simulation/emulation tools enhance better research experience and leads to improved quality of service parameters along with the ease of their usage.


Electronics ◽  
2021 ◽  
Vol 10 (13) ◽  
pp. 1515
Author(s):  
Maciej Sobieraj ◽  
Piotr Zwierzykowski ◽  
Erich Leitgeb

DWDM networks make use of optical switching networks that allow light waves of multiple lengths to be serviced and provide the possibility of converting them appropriately. Research work on optical switching networks focuses on two main areas of interest: new non-blocking structures for optical switching networks and finding traffic characteristics of switching networks of the structures that are already well known. In practical design of switching nodes in optical networks, in many cases, the Clos switching networks are successfully used. Clos switching networks are also used in Elastic Optical Networks that can effectively manage allocation of resources to individual multi-service traffic streams. The research outcomes presented in this article deal with the problems of finding traffic characteristics in blocking optical switching networks with known structures. This article aims at presenting an analysis of the influence of traffic management threshold mechanisms on the traffic characteristics of multi-service blocking Clos switching networks that are used in the nodes of elastic optical networks as well as their influence on the traffic efficiency of network nodes. The analysis was carried out on the basis of research studies performed in a specially dedicated purpose-made simulation environment. The article presents a description of the simulation environment used in the experiments. The study was focused on the influence of the threshold mechanism, which is one of the most commonly used and elastic traffic management mechanisms, and on the traffic characteristics of switching networks that service different mixtures of multi-service Erlang, Engset and Pascal traffic streams. The conducted study validates the operational effectiveness and practicality of the application of the threshold mechanism to model traffic characteristics of nodes in an elastic optical network.


2019 ◽  
Vol 23 (1) ◽  
pp. 192-195 ◽  
Author(s):  
Jules M. Moualeu ◽  
Daniel B. da Costa ◽  
Walaa Hamouda ◽  
Ugo S. Dias ◽  
Rausley A. A. de Souza

2019 ◽  
Vol 01 (03) ◽  
pp. 139-147
Author(s):  
Wang Haoxiang ◽  
Smys S

The developments in the means of transportation along with the communication advancements has made the automotives to step into its next level of innovation by providing a safe, convenient and well-timed transportation. This is made possible by the introduction of the frame work that is particularly designed to establish connectivity between vehicles on road without any previous structure to support with. This paradigm formed particularly in organizing communication between vehicles is the vehicular Adhoc network (VANET) that causes a vehicles to vehicle connection for proper managing of the traffic flow to make the travel more safe and comfortable. The paper proposes a dynamic mapping of real time traffic with the acquisition of digital map by crowd mapping with clustering to offer path optimization to minimize the delay in the responses, for having an efficient traffic managing. The evaluation of the proposed methodology ensures the minimization of the delay in the communication and the improved delivery ratio incurred, when compared with the carry-forward based routings methods that cause more delay resulting in imperfect traffic management.


Author(s):  
Mohammed Mouhcine Maaroufi ◽  
Laila Stour ◽  
Ali Agoumi

Managing mobility, both of people and goods, in cities is a thorny issue. The travel needs of urban populations are increasing and put pressure on transport infrastructure. The Moroccan cities are no exception and will struggle, in the short term, to respond to the challenges of the acceleration of the phenomenon of urbanization and the increase in demand for mobility. This will inevitably prevent them from turning into smart cities. The term smart certainly alludes to better use of technologies, but smart mobility is also defined as “a set of coordinated actions intended to improve the efficiency, effectiveness and environmental sustainability of cities” [1]. The term mobility highlights the preponderance of humans over infrastructure and vehicles. Faced with traffic congestion, the solutions currently adopted which consist of fitting out and widening the infrastructures, only encourage more trips and report the problem with more critical consequences. It is true that beyond a certain density of traffic, even Intelligent Transport Systems (ITS) are not useful. The concept of dynamic lane management or Advanced Traffic Management (ATM) opens up new perspectives. Its objective is to manage and optimize road traffic in a variable manner, in space and in time. This article is a summary of the development of a road infrastructure dedicated to Heavy Goods Vehicles (HGV), the first of its kind in Morocco. It aims to avoid the discomfort caused by trucks in the urban road network of the city of Casablanca. This research work is an opportunity to reflect on the introduction of ITS and ATM to ensure optimal use of existing infrastructure before embarking on heavy and irreversible infrastructure projects.


2020 ◽  
Vol 3 (1) ◽  
pp. 40
Author(s):  
Yordan Suryoatmojo

Pasuruan Regency is one of the regions in Indonesia which is precisely located in the province of East Java. With a very rapid economic development will certainly affect the flow of traffic, especially at the intersection. One of the most populous intersections is the Srikandi Four Intersection which is located in Pandaan District. To improve safety at an intersection, traffic management is necessary. This study aims to analyze the performance of the intersection by using the MKJI calculation and calculate the area of the Special Stop Room (RHK) of a motorcycle that refers to the Guidelines for Designing Motorcycle RHK at a Signed Intersection in the Urban Area planned on Jalan R.A. Kartini and Jalan A. Yani. The method used to plan the RHK of this motorcycle uses quantitative descriptive methods and qualitative descriptive methods. Intersection performance results obtained from calculations for the existing conditions of the North approach capacity (Jalan Urip Sumoharjo) 252 pcu / hour, queue length 131 m, degree of saturation of 0.85. Eastern approach capacity (Jalan Pahlawan Sunaryo) 265 pcu / hour, queue length 146 m, degree of saturation 0,85. South approach capacity (Jalan R.A. Kartini) 579 pcu / hour, queue length 134 m, degree of saturation of 0.85. The Western approach capacity (Jalan A. Yani) is 730 pcu / hour, the queue length is 104 m, the degree of saturation is 0.85, while the average delay is 59.10 seconds / pcu. From the performance analysis of the intersection, the length of the RHK motorcycle for the R.A. Kartini is 11.5 meters long, while for Jalan A. Yani it is 10.3 meters long.


2021 ◽  
Vol 62 (01) ◽  
pp. 141-146
Author(s):  
Gulnaz Tahir Hasanova ◽  

This study aims to highlight the growing strategic importance that cyberspace is gaining in the dynamics of international politics. After land, sea, air, and outer space, cyberspace is the fifth dimension of conflict. The type of non-military weapons used to fight, as well as the subjects targeted, make civilian systems new centers of gravity to defend against an enemy that most often "operates in the shadows." The international scenario rmation revolution (which contributed to the "democratization of information"), is radically evolving from a unipolar (American-led) to an almost multipolar architecture. The Internet today is an indispensable communication and information network for various legal and illegal subjects of international relations. Social networks (Facebook, Twitter, Telegram) play a very important role in this process. The Internet can also allow manipulation or even destabilization of the international community with the spread of false information (fake news). It is also a field for intelligence activities. Finally, the Internet is becoming the field of a new form of confrontation. Thus, both states and private actors protect themselves from possible cyber attacks by developing cybersecurity. In anticipation of this, states are developing cyberspace strategies and military-digital capabilities. Key words: international relations, information, cyberspace, cybersecurity, territorial integrity, state, subjects of international relations, information warfare


Sign in / Sign up

Export Citation Format

Share Document