International Journal of Wireless and Microwave Technologies (IJWMT)

IJWMT Vol. 10, No. 1, Feb. 2020

Cover page and Table of Contents: PDF (size: 791KB)

Table Of Contents

REGULAR PAPERS

Multipath Cluster-based Hybrid MAC Protocol for Wireless Sensor Networks

By Ch Rambabu V.V.K.D.V.Prasad K.Satya Prasad

DOI: https://doi.org/10.5815/ijwmt.2020.01.01, Pub. Date: 8 Feb. 2020

The WSN (Wireless Sensor Network) is the most appearing expertise that has potential applications broad ranges that include environment examining, smart spaces, medical systems, and robotic study. The efficient energy is a consideration of vital design for WSN. In WSNs, the collision is occurred due to data transmission from the sensor nodes and the traffic at SINK node is high due to the transmission of excess data by the sensor nodes. An important division of the consumption of resources in a WSN is managed by the mechanism of MAC (Medium Access Control). An existing MAC protocols initiated for the utilization of WSNs single channel for the transmission of data. This is basically because of the reality that efficient energy is measured to be the issue of essentiality in WSNs. A new multi-channel MAC procedure MPCB-HM is proposed which utilizes CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance), to exchange the data, the activity of TDMA (Time Division Multiple Access) sequencing nodes and also FDMA (Frequency Division Multiple Access) to allow collision-free exchange simultaneously.  The nodes have multiple communication channels, so that the high data traffic can be shared in multiple channels. This reduces the overhead in the nodes and the Energy consumption is minimized by this method and collision free transmission is achieved. With the help of intra-cluster communication and inter-cluster communication, the MAC mode control is responsible for shifting of mode from TDMA to CSMA and vice versa. The Cluster-based topology is implemented which helps in improving the scalability and energy efficiency. By utilizing the simulator of NS2, the process is estimated and the outcomes have shown that the procedure of MAC is improved by overall network presentation compared to the other protocols. 

[...] Read more.
Spectrum Sharing Technologies for Cognitive IoT Networks: Challenges and Future Directions

By Bekele M. Zerihun Thomas O. Olwal Murad R. Hassen

DOI: https://doi.org/10.5815/ijwmt.2020.01.02, Pub. Date: 8 Feb. 2020

In recent years, the number of devices connected to the Internet has been increased exponentially, which creates a new ecosystem known as the Internet of Things (IoT). According to Cisco’s prediction, it is expected that over 50 billion devices will be connected to the Internet by 2020. In fact, IoT is expected to be a key enabling technology to accommodate the massive connectivity of heterogeneous smart devices in the upcoming fifth-generation networks. However, in a limited resource environment, the existing spectrum will not be sufficient to satisfy all these spectrum demand. Sharing the idle spectrum in licensed and unlicensed bands is a feasible solution for effective IoT deployment. Therefore, in this paper, we provide a survey of advanced spectrum sharing techniques and emerging IoT technologies to exploit the spectrum both in existing licensed cellular infrastructures and unlicensed spectrum bands. To the best of our knowledge, different from the existing literature, we identify the potential research challenges and suggest future directions for efficient IoT deployment in next-generation wireless networks.

[...] Read more.
Design of a Virtual Area Network for National Open University Sokoto Study Center

By Bello A. Buhari Zaharaddeen M. Bello Sirajo Shehu

DOI: https://doi.org/10.5815/ijwmt.2020.01.03, Pub. Date: 8 Feb. 2020

Nowadays, there is a need for an efficient and effective way in which computers are interconnected. In National Open University Sokoto Study Center network there exist problems such as: more traffic which may slower the network performance, bandwidth wastage and security problems because the host and servers that are connected to Layer 2 switch are part of the same network segment. To resolve these problems we identify the networking media that best suits the network to enable person-to-person communication, determine the best network architecture that would enable effective resource sharing between all staff offices, design respective VLANs for different units, configure network addresses for each units and identify configurations required on router and switches to create VLAN’s and Inter VLANrouting. After the implementation of proposed Virtual Local Area Network in ICT unit of National Open University Sokoto study center, effective resource sharing and communication is achieved. Hence, implementation of this study is practically cost effective.

[...] Read more.
A Comprehensive Mechanism of MANET Network Layer Based Security Attack Prevention

By Mahaboob Sharief Shaik Fahad Mira

DOI: https://doi.org/10.5815/ijwmt.2020.01.04, Pub. Date: 8 Feb. 2020

The infrastructure benefits, which are achieved from the MANET architecture is the prime reason for the increase in usage for various purposes. The MANET architecture is made truly seamless with the capabilities of working without the central base stations or without the intervention of the central administration. The architecture for a MANET network is highly diversified and completely depends on the formation as the nodes in the MANET network can roam freely with a subsequent connection to any external device or any external networks. Yet another primary benefit of these devices and the networks are operability of the networks and the nodes without any human interventions. This property of the MANET network nodes makes the MANET devices operable in extreme conditions, where the human interventions are nearly impossible. In spite of these uncountable benefits, the MANET networks and the devices, which are part of the networkare always subjected to attacks from various sources. In this work, the attacks types for each network layer are identified and addressed to be prevented. The measures listed in this work are convertible as a modular component of any automated framework to make the complete attack prevention mechanism automated

[...] Read more.
Development of Android Controlled Arduino based Intelligent Car Parking System

By Khalid Mahboob Ibad Ur Rehman Muhammad Ali Mohammad Taha Khan Muhammad Rehman Nazir

DOI: https://doi.org/10.5815/ijwmt.2020.01.05, Pub. Date: 8 Feb. 2020

The automobile industry is currently looking at the technology needed to move from today's original autonomous autos to a self-contained and safe driving solution. The automobile industry has been remarkably successful in producing reliable, safe, and affordable cars over the past century. Due to the significant progress made in computers and telecommunications, an autonomous car became a reality. In this regard, an android driver-less car is a vehicle that uses a combination of motors, software, and sensors to park cars between destinations without a human operator. To be fully autonomous, vehicles must be able to travel unmanned to a pre-determined destination on roads that are not fit for use. In this paper, the android controlled Arduino based intelligent car parking development stages and functionalities has been discussed. The motor system will be composed of the dc motors that run the car as well as the wheels and body of the car. The DC motor controls the circuit and a software driver.  The android application will drive the car forward, reverse, left, and right (stopping will be the absence of a forward or backward command).  It will do this by means of the software driver.  There is also one motor which holds the brake and release. The significance of this system is that it has a distinctiveness to control real cars in real-time with android applications including steering control, gear shifting, horn control, and engine on/off. It has a self-parking system in a narrow crowded system through the sensors reading the environment and with actuators, a car could be park itself. Finally, on enabling effective automobile safety and efficient automotive cars, some of the challenges are needed to be addressed (and to provide) useful suggestions for approval by car manufacturers, designers, policymakers, and regulatory bodies.

[...] Read more.