All-Embracing Review Of Wireless Network Protocol, Optimum Network Simulator

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends (IJCOT)          
 
© 2013 by IJCOT Journal
Volume-3 Issue-1                          
Year of Publication : 2013
Authors :   Sandeep Gupta , BS Dhaliwal , Rahul Malhotra

Citation

  Sandeep Gupta , BS Dhaliwal , Rahul Malhotra "  All-Embracing Review Of Wireless Network Protocol, Optimum Network Simulator"  . International Journal of Computer & organization Trends  (IJCOT), V3(1):42-45 Jan - Feb 2013, ISSN 2249-2593,www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract

Wireless connectivity is the new murmur utterance in computer networks. It involves connecting laptops, mobile libraries and e ven fridges to computer networks, without physical wire connections. Wireless connectivity means that individuals can potentially entrée the Internet, CD - ROM networks and office networks from anywhere and at any time. This issue paper highlights the key el ements in wireless connectivity and the looming research required in this scorching area. This paper starts with the prologue of Wireless networks, followed by the simulation modus operandi of well known newly built wireless networking software OPNET. The paper also highlights delve into reviews of various researchers in this area and finally suggests the directions of research in this field of research.

References

[1] S. Pierre, G. Legault , “A genetic algorithm for designing distributed computer network topologies”, IEEE transaction on system, man and cybernetics, April 1998, vol. 28, issue 2, pp 249 - 258
[2] F. Kamoun, L. Kleinrock, “Analysis of shared finite storage in a computer network node environment under general traffic conditions”, IEEE transaction on communications, July 1980, vol. 28, issue 7, pp 992 - 1003
[3] Yu - Chee Tseng, Chih - shu Hsu, Ten - Yueng Hsieh, “Power saving protocols for IEEE 802.11 based multi hop adhoc networks”, comp uter networks magazine, October 2003, vol.43, issue 3, pp 317 - 337
[4] B.C. Neuman, T. T’so, “Kerberos: an authentication service for computer networks “, IEEE communication magazine, September 1994, vol.32, issue 9, pp 33 - 38
[5] C.S. Raghavendra, M. Gerla, A. Avizienis, “Reliable loop topologies for large local computer networks”, IEEE transactions on computers, January 1985, vol. c - 34, issue 1, pp 46 - 55
[6] Shenker, David Clark, Deborash Estin, Shai Herzog, “Pricing in computer networks: reshaping the rese arch agenda”, Telecommunication policy, April 1996, vol.2, issue 3, pp 183 - 201
[7] Laurent Paquereau, Bjarne E. Helvik, “A module based wireless node for NS2”, Proceedings from the workshop NS2: The IP network simulator, 2006, article 4
[8] Qichen, Felix Schnidt - Eisenlohr, Daniel Jiang, Marc - Torrent - Moreno, Luca Delgrossi, Hannes Hartenstein, “Overhaul of IEEE 802.11 modeling and simulation in NS2”, Proceedings of the 10 th ACM symposium on modeling, analysis and simulation of wireless and mobile systems, 2007, pp 159 - 168
[9] Min - Seak Kang, Jaeshin Jang, “Performance evaluation of IEEE 802.16d ARQ algorithm with NS2 simulator”, Communications magazine, August 2006, pp 1 - 5
[10] D. Mahrenholz, S.Ivanov, “Real time network emulation with NS2”, Eight IEEE Inte rnational symposiums on distributes simulation and real time applications, October 2004, pp 29 - 36
[11] S. Kurkowski, T. Camp, N. Mushell, M. Colagrasso, “Visualization and analysis tool for NS2 wireless simulations: iNSpect”, 13 IEEE International symposiu m on modeling, analysis and simulation of computer and telecommunications systems, September 2005, pp 503 - 506
[12] Li Huijie, Lin Xiaokang, “A network based 3 tier network simulation architecture”, 2005 IEEE International symposium on communication and inf ormation technology, October 2005, pp 793 - 796
[13] Yijinzhang, Pingping Xu, Guangguo Bi, Sheng Bao, “Analysis of energy efficient power saving in IEEE 802.15.4”, IEEE wireless communication and networking conference, march 2007, pp 3330 - 3334
[14] Li - ming, Li - dong Zhu, Shi - qiwa, “Design on the simulation platform for mobility management in LEO satellite network based on OPNET” Future generation communication and networking, 2007, vol. 1, pp 198 - 202
[15] M. Foras, J. Mohorko, “ Estimating the parameters of measured self similar traffic modeling in OPNET”, Systems, signals and image processing, June 2007, pp 78 - 81
[16] N. Golmie, R.E Vandyck, A. soltanian, “Interference of Bluetooth and IEEE 802.11 simulation, modeling and performance evaluation”, Internation al; workshop on modeling analysis and simulation of wireless and mobile systems, 2001, pp 11 - 18
[17] R. Pries, D. Staehle, D. Marsico, “Performance evaluation of piggyback requests in IEEE 802.16”, IEEE 66 th vehicular technology conference, September 2007, pp 1892 - 1896
[18] D. Stevanaic , N. Vlajc, “Performance of IEEE 802.15.4 in wireless sensor networks with a mobile sink implementing various mobility strategies”, 33 IEEE conference on local computer networks, October 2008, pp 680 - 688
[19] Guangwei Bai, C . Williamson, “Simulation evaluation of wireless web performance in an IEEE 802.11b classroom area network”, 28 Annual IEEE international conferences on local computer networks, October 2003, pp 663 - 672
[20] M.S. Hasan, Hangnian Yu, A. Griffiths, T.C Yang, “Simulation of distributed wireless networked control systems over MANET using OPNET”, 2001 IEEE International conference on networking, sensing and control, April 2007, pp 699 - 704
[21] Huazhu Zhu, Ming Li, I. Chlamtac, B. Prabhakaran, “A survey of qualit y of service in IEEE 802.11 networks”, IEEE wireless communications, August 2004, vol. 11, issue 4, pp 6 - 14
[22] S. Garg, M. Kapper, “An experimental study of throughput for UDP and VoIP traffic in IEEE 802.11b networks”, IEEE conference on wireless commun ication and networking, march 2003, vol.3, pp 1748 - 1753
[23] Mache Creeger, “Embracing wired networks”, Queue archive, vol.5, issue 4, June 2007, pp 12 - 15
[24] F. Cali, M.conti, E. Gregori, “IEEE 802.11 protocol: design and performance evaluation of an ada ptive backoff mechanism”, IEEE journal on selected areas in communications, September 2000, vol. 18, issue 9, pp 1774 - 1786
[25] R. Bruno, M. Canti, E. Gregori, “Mesh networks: commodity multihop adhoc networks”, IEEE communications magazine, March 2005, vo l. 43, issue 3, pp 123 - 131
[26] S.I. E.G. Nikolovzou, I.S. Venieris, “QoS issues in the converged 3G wireless and wired networks”, IEEE communications magazine, August 2002, vol. 40, issue 8, pp 43 - 53
[27] C.S. Raghavendra, M. Gerla, A. Avizienis, “Reliabl e loop topologies for large local computer networks”, IEEE transactions on computers, January 1985, vol.c - 34, issue 1, pp 46 - 55
[28] Chee - Yee Chang, S.P. Kumar, Booz Allen Hamilton, “Sensor networks: evolution, opportunities and challenges”, Proceedings of the IEEE, August 2003, vol. 91, issue 8, pp 1247 - 1256
[29] A. Adya, P. Bahl, J. Padhye, A. Wolwan, Lidong Zhou, “A multi - radio unification protocol for IEEE 802.11 wireless networks”, Proceedings of first international conference on broadband networks, Oc tober 2004, pp 344 - 354
[30] J. Comez, A.T. Campbell, M. Naghshinlh, C. Bisdikian, “Conserving transmission power in wireless adhoc networks”, Ninth international conference on network protocols, November 2001, pp 24 - 34
[31] B.P. Crow, I. Widjaja, L.G. Kim, P.T. Sakai, “IEEE 802.11 wireless local area networks”, IEEE communication magazine, September 1997, vol. 35, issue 9, pp 116 - 126
[32] M. Gastpar, M. Vetterli, “On the capacity of wireless networks: the relay case”, Proceedings of IEEE computer and commun ication society’s 21 st annual joint conference, 2002, vol. 3, pp 1577 - 1586
[33] Matthias Grossglauser, David N.C. Tse, “Mobility increases the capacity of adhoc wireless networks”, IEEE/ACM transactions on networking, 2002, vol. 10, issue 4, pp 477 - 486 [ 34] J.E. Wieselthier, G.D. Nguyen, A. Ephremides, “On the construction of energy efficient broadcast and multicast trees in wireless networks”, IEEE proceedings on computer and communications technologies, March 2000, vol. 2, pp 585 - 594
[35] Yaxin Cao, “ Scheduling algorithms in broadband wireless networks”, Proceedings of the IEEE, January 2001, vol. 89, issue 1, pp 76 - 87
[36] Chee - Yee Chang, S.P. Kumar, Booz Allen Hamilton, “Sensor networks: evolution, opportunities and challenges”, Proceedings of the IE EE, August 2003, vol. 91, issue 8, pp 1247 - 1256
[37] P. Gupta, P.R. Kumar, “The capacity of wireless networks”, IEEE transaction on information theory, vol. 46, issue 2, pp 388 - 404
[38] Andrew Rathmell, “Controlling computer network operations”, Informatio n and security magazine, 2001, vol. 7, pp - 121 - 144
[39] Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic, “Simulation of Packet Data Networks using OPNET”, http://www.ensc.sfu.ca/people/faculty/ljilj a/papers/opnetwork00_nazy.pdf
[40] Gilb erto Flores Lucio, Marcos Paredes - Farrera, Emmanuel Jammeh, Martin Fleury and Martin J. Reed, “ OPNET Modeler and Ns - 2: Comparing the Accuracy of Network Simulators for a Packet - Level Analysis using a Network Testbed” http://citeseerx.ist.psu.edu/viewdoc/
[41] A. Goldsmith, Wireless Communications : Cambridge University Press, 1 st Edition, August 2005.
[42] Behrouz A Forouzan, Data Communications and Networking: Tata McGraw Hill, 4 th Edition, 2007.
[43] Ranjan Kaparti, “OPNET IT Guru: A tool for networking education,” REGIS University.
[44] “OPNET Modeler Manual,” available at http://www.opnet.com
[45] “OPNET IT Guru Academic Edition” available at http://www.opnet.com/university_progr am/itguru_academic_edition

Keywords

Privacy, Distance measure, Closeness, Anonymity