Forthcoming articles


International Journal of Communication Networks and Distributed Systems


These articles have been peer-reviewed and accepted for publication in IJCNDS, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJCNDS are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Communication Networks and Distributed Systems (30 papers in press)


Regular Issues


  • Design and Analysis of a Stable AQM Controller for Network Congestion Control   Order a copy of this article
    by Sukant Kishoro Bisoy, Prasant Kumar Pattnaik, Bibudhendu Pati, Chhabi Rani Panigrahi 
    Abstract: In this work, a stable active queue management (AQM) controller named SAQM is proposed to control the congestion in the network and improve the stability of the queue length at Internet router. It is an integrated rate and queue based AQM technique which is stable and robust under dynamic environment where number of TCP connections, bottleneck bandwidth, round trip time (RTT), and target queue length keeps changing. The proposed AQM is implemented in NS2 network simulator. The control theory is used for stability analysis of TCP/SAQM system and finally validated through MATLAB Simulink model. The simulation results show that the SAQM outperforms other existing AQM controllers in terms of achieving queue stability, less oscillatory with faster response and at the same time it responds quickly to traffic change.
    Keywords: Congestion control; AQM; Control theory; Stability; Robust; Oscillation.

  • CETM: A Conflict-free Energy Efficient Transmission Policy in Mobile Cloud Computing   Order a copy of this article
    by Bibudhendu Pati, Chhabi Rani Panigrahi, Joy Lal Sarkar 
    Abstract: The rapid advancement of mobile devices creates huge interest to the users for performing various applications. For running those applications, sufficient energy is required which can fulfill the user requirements. To accommodate this challenge, in this work an energy optimal scheduling policy for Mobile Cloud Computing (MCC) named as CETM has been proposed. There are a number of work have been proposed in the literature which focus on energy efficiency of mobile devices but they do not support conflict-free scheduling. In CETM, the applications of mobile devices are split into a number of tasks and the inter release time of two consecutive tasks maintain atleast  steps. The CETM also supports offloading scheme to reduce the consumption of energy of mobile devices. The simulation results indicate that the proposed approach performs better as compared to the existing approaches such as eTime and ThinkAir.
    Keywords: Conflict-free execution; Mobile cloud computing; Scheduling policy.

  • A Task Allocation Model for Minimizing System Cost and Maximizing Reliability of Distributed Computing System   Order a copy of this article
    by NUTAN CHAUHAN, Harendra Kumar, Pradeep Yadav 
    Abstract: A distributing computing system (DCS) presents a platform consisting of multiple computing nodes connected in some fashion to which various task of a parallel application could be assigned. The cost and reliability are two important factors of performance measures of DCS. Effective task allocation is an essential phase to obtain the optimal cost and reliability of DCS. This paper addressed a new heuristic model of allocating the tasks onto multiple processors in order to achieve optimal cost and optimal reliability of the system. Execution cost on different processors and inter-task communication costs have been taken as fuzzy numbers, which are more realistic and general in nature. Fuzzy program is transformed into crisp one by using the method of defuzzification. A membership function is developed to transform the communication cost in unit interval [0, 1]. Clusters of tasks have been built on the basis of their membership values. To present the effect of proposed model, it has been implemented on various numerical examples and compared with other existing method related to this field.
    Keywords: Distributed computing system; Task allocation; Reliability; Failure rate; System cost.

  • Investigation a New Technique of Automatic Variable Key (AVK) Using Two Dimensional Matrix Approach to Achieve Perfect Security   Order a copy of this article
    by Moumita Das 
    Abstract: In all cryptosystem, the major challenge is to make the key unbreakable. Shannon proposed that, key would be impossible to break if the key is made time variant. The variable keys are highly enforced to provide the perfect security in Automatic Variable Key which is more novel approaches in Information Security field. The time variant key can be implemented by changing keys from session to session during data transfer for achieving perfect security. To attain this goal, key should be made variable by an agreement that creates new key for each session of data transfer at both sender and receiver sides. In this paper, we have proposed a new technique to generate time variant key by enhancing the randomness between two successive keys. The main purpose of this technique is to produce numerous keys in symmetric key cryptosystem with a behaviour which will be difficult to guess by the attacker.
    Keywords: Randomness; Computing & Shifting Automatic Variable Key (CSAVK); Key Variation with Random Number (KVRN).

  • Intelligent Clustering Protocol Design and Optimization in Wireless Sensor Networks   Order a copy of this article
    by Melaku Mekonnen, Kuda Rao 
    Abstract: Due to the requirement of nodes to share their local parameters so as to accomplish network configurations in distributed clustering, huge number of control packets will be flooded in the network. Communication overhead is one of the big troubles in distributed clustering for which protocols that are able to guarantee limited flow of control packets shall be introduced to deal with such type of problem. Having considered that most of fuzzy based protocols available in literatures are vulnerable to overhead of control packets in cluster setup phase, new approach has been introduced in this paper to reduce communication overhead and consequently optimizing distributed cluster formation. Nodes are integrated with fuzzy based decision support system to determine the selection probability of being cluster head. The set of temporary cluster heads will compete for being nominated as final cluster head based on which the network configuration is carried out. Once the clusters are formed, optimal routes towards the base station are established based on Ant Colony Optimization (ACO) algorithm. The optimization problem consists of finding routes towards the base station such that the tour length is minimized and the balance of energy consumption is maintained among routes in the path. The fuzzy logic and ACO toolboxes are developed in C++ and integrated with OMNeT++ simulation platform to implement the protocol. The experimental results prove that the proposed protocol extends the network lifetime compared to LEACH and CHEF protocols.
    Keywords: wireless sensor networks; intelligent clustering protocol; network lifetime; fuzzy logic; ant colony optimization.

  • A Swarm Intelligence Learning Model of Adaptive Incentive Protocols for P2P Networks   Order a copy of this article
    by Zheng Wang 
    Abstract: Incentive protocols are critical for promoting contribution and cooperation among peers in P2P networks. The behavior of peers has a significant impact on the effects of incentive protocols. Inspired by the biological systems, a swarm intelligence learning model of adaptive incentive protocols is proposed for P2P networks. The learning model is designed by having peers as particles in the moving swarm. The learning and adaption of peers are guided by the current best strategy as well as the best strategy in history. Simulation results demonstrate that the proposed learning model has a faster convergence rate towards at least the quasi-optimum than the two existing learning models.
    Keywords: P2P networks; incentive protocols; learning model; swarm intelligence.

  • A New Proposed Cloud Computing Based Architecture for Space Ground Data Systems   Order a copy of this article
    by Ali Kaddouri, Mustapha Guezouri, Nader Mbarek 
    Abstract: Cloud Computing gains more and more interest in different domains. Space domain community has decided to move on this new technological model to manage, monitor and explore huge space data in the space ground data systems. Moving to a Cloud based solution needs to adapt the classic architecture by taking into account the Cloud model. In this paper, we propose a framework that will permit to earth observation missions to handle and monitor space data throughout a Cloud Computing based architecture. The proposed solution shows benefits on access time, resource consumption and exploration as well as storage optimization compared to a classic architecture. Also, it permits to deploy an interoperability process between multiple space ground data systems to decrease mission design cost.
    Keywords: Cloud Computing; Space mission; Ground data system; Network architecture; QoS; Ground Data System.

  • Web user interface based on OGC standards for Sensor Cloud using Big Data   Order a copy of this article
    by Vijayasherly Velayutham, Srimathi Chandrasekaran, Subaji Mohan 
    Abstract: Sensor Cloud is the combination of wireless sensor networks and Cloud computing which perform real-time data acquisition and processing in a distributed environment. Sensor cloud infrastructure enables collection, processing, sharing, visualization, archival and searching of large amounts of sensor data. Sensor Cloud makes it possible for the sharing of computing resources and data, on an unprecedented scale, among an infinite number of geographically distributed groups. The paper provides an implementation of efficient web based technology for processing large and heterogeneous set of data based on Open Geospatial Consortium Standards. The web user interface proposed uses the sensor cloud middleware and wireless sensors for distributed applications that process large amounts of data. Sensor cloud middleware in the proposed work uses Open Stack, the open source cloud, and Hadoop framework along with utilities such as a modeling tool named Generic Modeling Environment for workflow modeling, HBase for big data management and Zabbix for monitoring. The user interface with features such as viewing sensor data, scheduling sensors for data collection and alerting users based on Open Geospatial Consortium standards have also been discussed.
    Keywords: Sensor Cloud; middleware; Open Stack; Hadoop; big data; sensor web; user interface.

  • Routing in Networks using Genetic Algorithm   Order a copy of this article
    by Meenakshi Moza, Suresh Kumar 
    Abstract: Performance and Reliability of the Internet, is vastly dependent on the underlying protocols. With the recent increase in the traffic, internet service providers are forced to seek solutions for better and improved services within the available resources. While the current traffic loads have to be taken into account for computation of paths in routing protocols, network applications require the shortest paths to be used for a speedy communication. The Open Shortest Path First (OSPF) is the routing algorithm used to find the shortest path from source to destination, however, the overloading of the path or link congestion exposes the limitations of OSPF. This shortcoming can be overcome by optimization of the network through the application of Genetic Algorithm, as it provides a valuable alternative to the overloaded path between the source and the destination. This paper proposes a distinct method of calculating the shortest path in a network by extending OSPF Algorithm with Genetic Algorithm (OSGA) for achieving the desired improved performance.
    Keywords: Genetic Algorithm (GA) ; Open Shortest Path First (OSPF) ; Quality of service (QOS); Chromosome; Mutation; Routing.

  • A Robust Deterministic Approach to Node Localization using NLOS Signal   Order a copy of this article
    by Kaushik Mondal, Partha Sarathi Mandal, Bhabani P. Sinha 
    Abstract: Localization in an urban area is a challenging problem due to the blocking of Line-Of-Sight (LOS) signal by various obstacles and also the multipath effect arising out of reflection, scattering, diffraction, etc. of signals. Assuming that there are a few anchor nodes which know their positions accurately and which transmit ultrasonic or radio frequency signals, we propose here a technique to find the position of other sensor nodes based on receiving these signals reflected by some reflectors. Our proposed technique can calculate the position of a node correctly by receiving two reflected signals i.e., Non-Line-of-Sight (NLOS) signals from an anchor if there is no measurement error. But in presence of range measurement error, position of a node can be calculated approximately. We, however, assume that a signal is reflected at most once before reaching a node. In presence of error in range estimation, simulation results show better accuracy compared to existing works. While a network is growing, wrong position information may get assigned to some nodes by accident. According to our robust localization in NLOS, an anchor can detect inconsistency of the wrong position information with the help of three reply signals from a particular node via different paths.
    Keywords: Localization; NLOS Signal; AoA; ToA; Wireless Sensor Networks.

  • Routing Selection in Mobile Ad hoc Network Using Soft Computing Approaches   Order a copy of this article
    by Hany Ramadan, Ben Bella Tawfik, Alaa El Din Riad 
    Abstract: Routing in the Mobile AD-Hoc Network (MANET) is a challenging task and has received a great amount of attention from researchers. This paper introduces an exact reference routing model to find the shortest path (optimum route). This model is a conventional combinatorial that selects the shortest route from all possible routes. To demonstrate the use of this reference model for comparison a second model is selected which is a modified Ant Colony Optimization (ACO).The good selection of the heuristic parameters of the ACO model increases its matching degree with the reference one. Therefore a training pre-processing phase is added to select the best parameters for ACO model. The two models are compared using four different criteria. These criteria are the execution time, energy consumption, the total cost, and the network life time. A simulation experiment is performed and the results show that the modified Ant Colony algorithm is superior in execution time but consumed more energy than the reference combinatorial and its total cost is greater than or equal to the other one. The life time analysis shows that the reference model has better life time than the modified ACO model.
    Keywords: Routing; MANET; Ant colony; energy consumption; execution time; total cost; shortest path; optimum route; simulation.

  • Resource Prediction based Routing using Agents in Mobile Ad-hoc Networks   Order a copy of this article
    by Shilpa Chaudhari, Rajashekhar Biradar 
    Abstract: QoS routing in multimedia applications over MANET is affected by limited resources, shared channel, unpredictable mobility, improper load balancing, and variation in signal strength. Existing works on MANET routing focuses on only one of the factor such as bandwidth, mobility or energy neglecting dependent behavior. QoS routing must consider efficient usage of resources with intelligent schemes such as software agents for identifying routes with sufficient resources in future. The proposed resource prediction based routing in this paper uses intelligent agents to route the packets on the path with adequate buffer-space, energy and bandwidth resources. It has four steps of execution: resource prediction, resource prediction factor computation, route establishment, and route maintenance. Resources are predicted to compute resource prediction factors for reliable route establishment. Route maintenance against link and node failure. Simulation results show an improvement in terms of packet delivery ratio, packet delivery latency, memory overhead and energy consumption.
    Keywords: Mobile Ad hoc Networks; Wavelet neural network; Resource prediction; Cognitive Agents; Routing.

  • Energy Conservation Routing Algorithm for Wireless Sensor Networks using Hybrid Optimization Approach   Order a copy of this article
    by Logambigai Rajasekaran, Kannan A 
    Abstract: In designing Wireless Sensor Network (WSN), the conversation of energy is an important issue to prolong the network lifetime. Most of the energy is wasted during transmission. To overcome this, an energy efficient routing protocol is proposed in this paper using a hybrid optimization technique. Moreover, a nature inspired hybrid optimization approach called Bacterial Swam Optimization (BSO) is used in this work for energy optimization in WSN. BSO is an amalgam of two optimization techniques namely Particle Swarm Optimization (PSO) and Bacterial Foraging Optimization (BFO). BSO is used to identify the optimal next hop node for each gateway which in turn results in optimal route. The optimal relay nodes are selected based on lifetime of the gateways and distance in hops between gateways and base station. The results obtained from the simulation show that this proposed BSO based algorithm outperforms the other existing algorithm for routing.
    Keywords: Bacterial swarm optimization; Wireless sensor networks; Routing; Gateways; Clustering; Particle swarm optimization; Bacterial foraging optimization.

  • Energy Efficient QoS Routing for Mobile Ad-hoc Networks   Order a copy of this article
    by Saravanan R 
    Abstract: Many researchers developed several routing techniques to reduce the power consumption of the nodes without decreasing capacity of the network, to increase life time of the network while preserving the connectivity of nodes. A routing protocol is presented in this paper that reduces overall energy consumption of nodes in the mobile ad-hoc networks. This routing protocol focuses on energy conservation and also it provides some of the necessary quality of services in routing such as throughput, packet delivery ratio and less error rate. This routing protocol utilizes the bandwidth of the network effectively and finds the minimum energy consuming path that has less error rate. Recharging capability of the nodes is taken into consideration while computing minimal energy consuming path from source to destination. The protocol is simulated for various network parameters using a network simulator. The performance of proposed protocol is evaluated by comparing the simulation results with the results of one of the popular routing protocols such as DSR.
    Keywords: Energy efficient routing; MANET; network life time; QoS routing.

  • Achieving efficiency in Autonomic Network Management of IP networks based on SDN management logic   Order a copy of this article
    by Madjed Bencheikh Lehocine, Mohamed Batouche 
    Abstract: The layer-three redundancy in large companies IP networks remains a major concern, aiming to increase, as much as possible, the availability ratio for the offered services to the customers. However, deploying the existing protocols requires in addition to providing backup links and physical equipment, the manual configuration which is time-consuming and error-prone. ARRC (Autonomic Router Redundancy Controller) was the first autonomic solution whose objective was to deploy redundancy on existing networks. Yet, this solution was unable to handle redundancy in all network scenarios. In this paper, we propose a new approach E-ARRC (Extended ARRC), inspired from Software Defined Networking (SDN) management logic to address ARRC shortcomings and limitations. SDN represents a new vision for the future networks, aiming to reduce complexity and to ensure an efficient control of the network behaviour. Based on a global view of the network, SDN achieves business needs via a high-level specification of rules which are applied accordingly on the SDN capable nodes. The results of our approach, which is based on shared-networks reachability, illustrate a more granular level of redundancy, with a reliable exploitation of all the available resources.
    Keywords: Autonomic Network Management; Self-Management; Autonomic Computing; MAPE Loop; Software Defined Networking; SNMP; FHRP; VRRP; ARRC; Policy Based Routing; SLA; Layer-Three Topology Discovery.

  • E-ABRM: Enhanced ABRM Routing Protocol for MSNs with Multiple Mobile Sinks   Order a copy of this article
    by Maged S. Soliman, Hossam FAHMY 
    Abstract: The recent technological advances in the field of wireless sensor networks (WSNs) have expanded the range of WSN applications. In some of these applications, sensor nodes are mobile rather than static. Also, the recent advances in personal digital assistants (PDAs) allow the existence of multiple mobile sinks to collect the sensors data. These characteristics require the design of new routing protocols to meet the existence of mobile sensors and multiple mobile sinks while taking into consideration the limited resources for sensor nodes especially the energy. In-network aggregation is one of the important techniques used to save power consumption by aggregating the data on sensor nodes before transmitting towards the sinks and hence reduce the number of transmissions required. ABRM, as previously proposed, is an aggregation based routing protocol for mobile sensor networks (MSNs) with multiple mobile sinks. This paper proposes Enhanced ABRM (E-ABRM) to improve the aggregation results and reduce the routing overhead and power consumption. E-ABRM is compared to ABRM and CCBR through mathematical analysis and simulation results. The comparisons show that E-ABRM reduces aggregation error, routing overhead, and energy consumption.
    Keywords: E-ABRM; ABRM; In-Network Aggregation; Wireless Networks; Wireless Sensor Networks; Mobile Sensor Networks; Routing; WSN; MSN; Multiple Sinks; Mobile Sinks;.

  • Data Anonymization of Vertically Partitioned Data Using Map Reduce Techniques on Cloud   Order a copy of this article
    by Thangaramya Kalidoss, Ganapathy Sannasi, Sairamesh Lakshmanan, Kulothungan Kanagasabai, Kannan Arputharaj 
    Abstract: Security is an important challenge in cloud database. It can be provided using cryptographic techniques, access control and key management. However, encryption and compression are useful for secured storage. Hence, a new security mechanism is proposed in this paper to enhance the security of cloud databases. The major objective of this paper is to propose a new technique for data security in cloud databases. This techniques consists of two phases namely anonymization & encryption and is implemented using map reduce techniques. We use the Advanced Encryption Standard algorithm for effective encryption of data and also used the secured hash algorithm for security and compression of data which are used for read only applications. Experimental results of this work show that our approach provides higher security and effective storage over the existing approaches.rnrnrn
    Keywords: Data Anonymization; Top-Down Specialization; Map Reduce; Cloud; Privacy Preservation.

  • Simple Algorithms for Selecting an Energy-efficient Server in a Cluster of Servers   Order a copy of this article
    by Dilawaer Duolikun, Hiroki Kataoka, Tomoya Enokido, Makoto Takizawa 
    Abstract: Electric energy consumed by computers, especially servers in scalable clusters has to be reduced to realize eco society. In this paper, we first propose a power consumption model, MLPCM (multi-level power consumption) model which gives how much electric power a server consumes to perform application processes. We also propose a computation model, MLCM (multi-level computation) model which shows the expected execution time of an application process performed on a server. By using the MLPCM and MLCM models, we propose a pair of SLEA (simple locally energy-aware) and SGEA (simple globally energy-aware) algorithms to select a host server to perform an application process issued by a client. In the SLEA algorithm, a host server is selected, which is expected to consume the minimum electric energy to perform the process. In the SGEA algorithm, a host server is selected,where the total expected electric energy of not only the host server but also the other servers is minimum.rnIn the evaluation, we show the total electric energy consumption and active time of the servers and the average execution time of processes can be reduced in the SGEA algorithm.
    Keywords: Energy-efficient computation; Power consumption model; SLEA (simple locally energy-aware) and SGEA (simple globally energy-aware) algorithms.

  • Secure Multipath Routing for Multimedia Communication in Cognitive Radio Networks   Order a copy of this article
    by Ansuman Bhattacharya, Sasthi C. Ghosh, Koushik Sinha, Bhabani P. Sinha 
    Abstract: In this paper, a novel technique for secure multihop communication of multimedia data in cognitive radio networks is proposed even when a single contiguous band of required width for maintaining the desired {em Quality of Service} ($QoS$) is not available for any hop in the route. The proposed technique first creates a number of sub-packets formed by suitably shuffling the bits of the original packet, finds multiple routes by executing the max-flow algorithm on a derivative of the network graph ($G$) (which may not be, in general, a symmetric graph due to variation of transmission/sensing range of different nodes) to meet the required bandwidth, allocates channels for each hop appropriate for either $FDM-FDMA$ or $OFDM-FDMA$ technique adopted for channel access, and sends the sub-packets along these channels which are received by the destination node to form the original packet. This strategy of multi-path routing also leads to enhanced security of the data packets as an added advantage. This is because when these multiple paths chosen for transmitting the sub-packets are node-disjoint, it will be extremely difficult for an eavesdropper to guess {em any part} of the original information from the sub-packets received along a single route as they contain only some {em selected} bits of the original packet, and this would significantly enhance the security of the original message. The proposed technique for multi-path routing takes $O(pf + T_{SD})$ time, where $p$ and $f$ are the number of edges and maximum flow, respectively of $G$ and $T_{SD}$ is the time for constructing $G$.
    Keywords: Cognitive radio network; max-flow; multimedia communication; secure multi-hop routing; $FDM-FDMA$; $OFDM-FDMA$.

  • Energy Efficient with time synchronized and Service Coverage Guarantee in Wireless Sensor Networks   Order a copy of this article
    by Chirihane Gherbi, Aliouat Zibouda, Mohamed Benmohammed 
    Abstract: Load balancing is an effective enhancement to the proposed routing protocol, the basic idea is to share traffic load among cluster members in order to reduce the dropping probability due to queue overflow at some nodes. Sharing traffic inside a cluster is reasonable, because nodes in the same cluster have similar mobility pattern, and thus similar ability to deliver data messages. In this paper, a novel hierarchical approach called distributed energy efficient adaptive clustering protocol with data gathering, Load-Balancing and self-adaptation (DEACP) is proposed for Wireless Sensor Network. We have proposed (DEACP) approach to reach the following objectives: reduce the overall network energy consumption, balance the energy consumption among the sensors and extend the lifetime of the network, the clustering must be completely distributed, the clustering should be efficient in complexity of message and time, the cluster-heads should be well-distributed across the network, the load balancing should be done well, the clustered WSN should be fully-connected. We consider the problem of conserving energy by turning off the nodes radio for periods of a fixed time length. While packets may continue to arrive at the nodes buffer during the sleep periods, the node cannot transmit them until it wakes up, the objective is to design sleep control laws that minimize the expected value of a cost function representing both energy consumption costs and holding costs for backlogged packets. As a result transmission power of the node is reduced which subsequently reduces the energy consumption of the node. Our proposed work is simulated through Network Simulator (NS-2). Simulations show that (DEACP) clusters have good performance characteristics.
    Keywords: Energy saving; Distributed algorithm ,Load Balancing ,Cluster- based routing ,Wireless Sensor Network.

  • Performance Analysis of WMNs by WMN-GA Simulation System for Two WMN Architectures and Different TCP Congestion-Avoidance Algorithms and Client Distributions   Order a copy of this article
    by Keita Matsuo, Shinji Sakamoto, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli 
    Abstract: In this paper, we evaluate the performance of two Wireless Mesh Networks (WMNs) architectures considering Packet Delivery Ratio (PDR), throughput, delay and fairness index metrics. For simulations, we used ns-3, Distributed Coordination Function (DCF) and Optimized Link State Routing (OLSR). We compare the performance of Transmission Control Protocol (TCP) Tahoe, Reno and NewReno for normal and uniform distributions of mesh clients by sending multiple Constant Bit Rate (CBR) flows in the network. The simulation results show that the PDR for both distributions and architectures is almost the same, but the PDR of I/B WMN for uniform distribution is a little bit higher than normal distribution. For both WMN architectures, the throughput of normal distribution is better than uniform distribution. The delay of Tahoe is a little bit lower compared with other algorithms for normal distribution and Hybrid WMN, but in case of uniform distribution, the NewReno performs better than other algorithms for both architectures. The fairness index of normal distribution is higher than uniform distribution.
    Keywords: Wireless Mesh Networks; Genetic Algorithm; Node Placement; WMN Architectures; TCP Congestion-Avoidance Algorithms.

  • A secure and decentralised SIP for mobile ad hoc networks   Order a copy of this article
    by Mohammed Hussain, Dhafer Ben Khedher 
    Abstract: Mobile ad hoc networks (MANETs) are infrastructureless and can be set up temporarily. They can host a wide range of conferencing applications, such as audio/video conferencing. Decentralised versions of session initiation protocol (SIP) fit the lightweight and scalability requirements needed for MANETs. Security in decentralised SIP has not yet been addressed. This paper presents an authentication scheme for decentralised SIP. The scheme allows the members of a decentralised SIP-based conference to securely perform SIP operations. The scheme employs identity-based signatures cryptography. The practicality and effectiveness of the scheme is illustrated using a working prototype.
    Keywords: distributed SIP; SIP security; mobile ad hoc network; MANET.
    DOI: 10.1504/IJCNDS.2018.10008955
  • IntersectionCast: approximation algorithm for multi-directional broadcast storm in VANETs   Order a copy of this article
    by Debasis Das, Rajiv Misra 
    Abstract: We formulate a multi-directional broadcast (MDB) storm problem arising in dense vehicular ad-hoc networks (VANETs) when the multiple nodes (moving in multiple directions) forward broadcast packets meet at the road intersections, resulting in severe packet collisions inducing delays at medium access control. In this work, we have proposed a mechanism for partitioning the graph of vehicles in an intersection into multiple bipartite directional sub-graphs, such that each sub-graph aggregates messages using short range communication and make one long range communication of aggregated message. The k balanced graph partitioning problem contains partitions of size ≤ |V|/k nodes. For a graph G = (V, E), a partitioning P, is (k, 1 + ε) balanced if V is partitioned into k disjoint subsets each containing at most (1 + ε)n/k vertices. Our proposed approximation algorithm for intersection-cast problem uses a balanced partition with Θ (log^2 n) approximation for balance constant, v > 1. We have given simulation results for the performance analysis of our intersection-cast protocol compared to the existing competitive schemes and found improvement in terms of broadcast success rate, reachability and message overhead in the networks.
    Keywords: multi-directional broadcast; MDB; broadcast storm; vehicular ad-hoc networks; VANETs; road intersection; NP completeness; approximation algorithm.
    DOI: 10.1504/IJCNDS.2018.10008956
  • Multiple order-preserving hash functions for load balancing in P2P networks   Order a copy of this article
    by Maeva Antoine, Fabrice Huet 
    Abstract: Hash functions are at the heart of data insertion and retrieval in DHT-based overlays. However, a standard hash function destroys the natural ordering of data. To perform efficient range queries processing, more and more systems opt for an order-preserving hash function to place data. Unlike a standard hash function, this technique cannot evenly distribute data among peers. We propose a novel approach to improve the data dissemination using several order-preserving hash functions. We describe a protocol that allows an overloaded peer to change its hash function at runtime. Then, we show that all peers should not necessarily use the same hash function in an overlay to insert or look for an item. Finally, we demonstrate through simulations that this strategy greatly improves the dissemination of data items. To our knowledge, this is the first load balancing solution using multiple order-preserving hash functions in structured overlays.
    Keywords: hash functions; load balancing; structured overlays; skewed data; lexicographic order; peer-to-peer; P2P; semantic web; resource description framework; RDF.
    DOI: 10.1504/IJCNDS.2018.10008958
  • Multipath routing protocols for wireless multimedia sensor networks: a survey   Order a copy of this article
    by Asma Chikh, Mohamed Lehsaini 
    Abstract: Recent advances in sensor networks have led to a new category of networks called wireless multimedia sensor networks (WMSNs). These networks can support a variety of multimedia applications that have more requirements than other kinds of applications in terms of latency, energy consumption and quality of service. However, routing protocols designed initially for sensor networks cannot fulfil these requirements specially those involving a single-path in the data delivery process. For this purpose, multipath routing protocols are considered as appropriated solutions to achieve these goals since they can efficiently reduce energy consumption, prolong network lifetime, reduce latency and enable load balancing. In this paper, we survey recent multipath routing protocols designed for WMSNs and present a general classification for the various approaches pursued. Moreover, we also compare them based on relevant metrics such as architecture, hole bypassing, path disjointness, load balancing, bandwidth aggregation, energy efficient, reducing delay and data reliability.
    Keywords: energy-efficient; load balancing; multimedia applications; multipath routing; QoS requirements; wireless sensor networks; WSNs; wireless multimedia sensor networks; WMSNs.
    DOI: 10.1504/IJCNDS.2018.10008957
  • Achieving a high throughput and a low latency through a modular packet scheduler   Order a copy of this article
    by Maurizio Casoni, Carlo Augusto Grazia, Paolo Valente 
    Abstract: Providing QoS guarantees in a wireless environment is a challenging task because of the idiosyncrasies of the wireless media. State-of-the-art solutions for QoS provisioning over wireless links are based on cross-layering packet schedulers that deal both with the QoS guarantees and the wireless link issues. Unfortunately, such an approach is not flexible and requires technology-dependent solutions. To address these issues, we present a modular architecture which permits the use of existing high-performance packet schedulers for wired links over generic wireless technologies, as they are, and at the same time allows the flexibility to adapt to different channel conditions. We validate the effectiveness of our modular solution through a formal analysis. We also present high-throughput twin fair scheduler (HFS), a novel packet scheduler based on the modular architecture. HFS has constant execution time, accurate fairness, and low latency.
    Keywords: cross-layering; latency; QoS; scheduling; throughput.
    DOI: 10.1504/IJCNDS.2017.10004206
  • Hierarchical routing technique for traffic control in future internet architecture   Order a copy of this article
    by Vinodha Krishnareddy, Selvarani Rangaswamy 
    Abstract: The conventional TCP-based communication techniques are no longer effective in controlling dynamic situation of traffic congestion especially for future internet architecture. We reviewed the existing techniques and found that the problem of traffic congestion pertaining to heterogeneous wireless network is still not resolved. The design principle adopted in our research discusses the network architecture that is suitable for node deployment, mobility, routing, and evaluation of QoS requirement for future internet. The significance of the outcomes is being measured through QoS parameters like data transmission, channel capacity and energy dissipation. The results show that proposed routing scheme offers an efficient control over congestion in future internet.
    Keywords: congestion control; future internet architecture; distributed network; routing; network traffic control; quality of service; hierarchical routing; heterogeneous network; node mobility; energy consumption.
    DOI: 10.1504/IJCNDS.2018.10008961

Special Issue on: Emerging Trends, Applications and Services in Communication Networks

  • CD-SFA: Stochastic Frontier Analysis Approach to Revenue Modeling in Large Cloud Data Centers   Order a copy of this article
    by Jyotirmoy Sarkar, Bidisha Goswami, Snehanshu Saha, Saibal Kar 
    Abstract: Enterprises are investing heavily in cloud data centers to meet the ever surging business demand. Data Center is a facility,rnwhich houses computer systems and associated components, such as telecommunications and storage systems. It generally includesrnpower supply equipment, communication connections and cooling equipment. A large data center can use as much electricity as arnsmall town. In todays world due to the emergence of data-center based computing services, it has become necessary to examine howrnthe costs associated with data centers evolve over time, mainly in view of efficiency issues. We have presented a quasi form ofrnCobb-Douglas model, which addresses revenue and profit issues in running large data centers. The stochastic form has beenrnintroduced and explored along with the quasi Cobb-Douglas model to understand the behavior of the model in depth. Harrod neutralityrnand Solow neutrality are incorporated in the model to identify the technological progress in cloud data centers.This allows us to shedrnlight on the stochastic uncertainty of cloud data center operations. A general approach to optimizing the revenue/cost of data centersrnusing Cobb Douglas Stochastic Frontier Analysis(CD-SFA) is presented. Next, we develop the optimization model for data centers.rnThe mathematical basis of CD-SFA has been utilized for cost optimization and profit maximization in data centers. The results arernfound to be quite useful in view of production reorganization in large data centers around the world.
    Keywords: Data Center; Cobb-Douglas; Harrod neutrality; Solow neutrality; Optimization; Stochastic Frontier Analysis; Cloud andrnUtility Computing.

  • Adaptive Spectral Subtraction to improve quality of speech in Mobile Communication   Order a copy of this article
    by Purushotham Ugraiah 
    Abstract: With the development of VLSI Technology, Mobile communication is supported by smart devices for transmission and reception of information in various forms. In order to improve the quality of speech communication smart devices are provided with Pre-Processing algorithms. These Algorithms should be adaptive in nature to suppress the real time noise. The performance of smart devices depends on the algorithms, which depends on various parameters. The Performance of smart devices is excellent in noise-free surroundings; however their performances worsen in noisy surroundings. Generally spectral domain weighting approaches which estimates amplitude and spectral density of noise are considered for speech enhancement. Considering delay and complexity involved in processing complex speech signals, short frames are used in algorithms. In this paper we propose one such novel algorithm for assessment of noise in very small bands based on type of disturbance .Thus using multiband time-varying filtering coefficients, speech signals are modelled by autoregressive process. Experimental results demonstrate an improvement of 25% to 45% as compared to other conventional multiband approach
    Keywords: Smart; Algorithms; Enhancement; Multiband; Autoregressive.

Special Issue on: Recent Advances in Communication and Networking

  • RQ-AQM: A Rate and Queue-based Active Queue Management Using Feedback Control Theory   Order a copy of this article
    by Sukant Bisoy 
    Abstract: This work proposes a rate and queue based active queue management (RQ-AQM) algorithm to improve the stability of the network system supporting TCP flows. Classical control theory employed to analyze the stability of TCP/RQ-AQM system and provide systematic guidelines to select control gain parameters of the RQ-AQM. The performance of the proposed algorithm is evaluated and compared with existing algorithms using network simulator-2 (NS2). Simulation results demonstrate that RQ-AQM achieves stability with faster responsive to the dynamic network conditions. The proposed algorithm obtains better performance with respect to throughput, link utilization, average delay and achieves fastest settling time than others.
    Keywords: AQM; Control theory; Feedback system; Stability; Settling time.