-
Energy Efficient MAC Protocols in Wireless Body Area Sensor Networks -A Survey
Authors:
N. Javaid,
S. Hayat,
M. Shakir,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
In this paper, we first presented an analytically discussion about energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). For this purpose, different energy efficient MAC protocols with their respective energy optimization techniques; Low Power Listening (LPL), Scheduled Contention and Time Division Multiple Access (TDMA), are elaborated. We als…
▽ More
In this paper, we first presented an analytically discussion about energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). For this purpose, different energy efficient MAC protocols with their respective energy optimization techniques; Low Power Listening (LPL), Scheduled Contention and Time Division Multiple Access (TDMA), are elaborated. We also analytically compared path loss models for In-body, On-body and Off-body communications in WBASNs. These three path loss scenarios are simulated in MATLAB and results shown that path loss is more in In-body communication because of less energy level to take care of tissues and organs located inside human body. Secondly, power model for WBASNs of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and beacon mode is also presented. MATLAB simulations results shown that power of CSMA/CA mode is less as compared to beacon mode. Finally, we suggested that hybrid mode is more useful to achieve optimization in power consumption, which consequently results in high energy efficiency.
△ Less
Submitted 8 March, 2013;
originally announced March 2013.
-
Energy Efficient MAC Protocols
Authors:
S. Hayat,
N. Javaid,
Z. A. Khan,
A. Shareef,
A. Mahmood,
S. H. Bouk
Abstract:
This paper presents a survey of energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). We highlight the features of MAC protocols along with their advantages and limitations in context of WBASNs. Comparison of Low Power Listening (LPL), Scheduled Contention and Time Division Multiple Access (TDMA) is also elaborated. MAC protocols with respect t…
▽ More
This paper presents a survey of energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). We highlight the features of MAC protocols along with their advantages and limitations in context of WBASNs. Comparison of Low Power Listening (LPL), Scheduled Contention and Time Division Multiple Access (TDMA) is also elaborated. MAC protocols with respect to different approaches and techniques which are used for energy minimization, traffic control mechanisms for collision avoidance are discussed.We also present a survey of path loss models for In-body, On-body and Off-body communications in WBASNs and analytically discuss that path loss is maximum in In-body communication because of low energy levels to take care of tissues and organs located inside the body. Survey of Power model for WBANs of CSMA/CA and beacon mode is also presented.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
The artifacts of component-based development
Authors:
M. Rizwan Jameel Qureshi,
Shaukat Ali Hayat
Abstract:
Component based development idea was floated in a conference name "Mass Produced Software Components" in 1968 [1]. Since then engineering and scientific libraries are developed to reuse the previously developed functions. This concept is now widely used in SW development as component based development (CBD). Component-based software engineering (CBSE) is used to develop/ assemble software from exi…
▽ More
Component based development idea was floated in a conference name "Mass Produced Software Components" in 1968 [1]. Since then engineering and scientific libraries are developed to reuse the previously developed functions. This concept is now widely used in SW development as component based development (CBD). Component-based software engineering (CBSE) is used to develop/ assemble software from existing components [2]. Software developed using components is called component ware [3]. This paper presents different architectures of CBD such as ActiveX, common object request broker architecture (CORBA), remote method invocation (RMI) and simple object access protocol (SOAP). The overall objective of this paper is to support the practice of CBD by comparing its advantages and disadvantages. This paper also evaluates object oriented process model to adapt it for CBD.
△ Less
Submitted 11 February, 2012;
originally announced February 2012.
-
Search Engine Optimization Techniques Practiced in Organizations: A Study of Four Organizations
Authors:
Muhammad Akram,
Imran Sohail,
Sikandar Hayat,
M. Imran Shafi,
Umer Saeed
Abstract:
Web spammers used Search Engine Optimization (SEO) techniques to increase search-ranking of web sites. In this paper we have study the essentials SEO techniques, such as; directory submission, keyword generation and link exchanges. The impact of SEO techniques can be applied as marketing technique and to get top listing in major search engines like Google, Yahoo, and MSN. Our study focuses on thes…
▽ More
Web spammers used Search Engine Optimization (SEO) techniques to increase search-ranking of web sites. In this paper we have study the essentials SEO techniques, such as; directory submission, keyword generation and link exchanges. The impact of SEO techniques can be applied as marketing technique and to get top listing in major search engines like Google, Yahoo, and MSN. Our study focuses on these techniques from four different companies' perspectives of United Kingdom and Pakistan. According to the these companies, these techniques are low cost and high impacts in profit, because mostly customers focus on major search engine to find different products on internet, so SEO technique provides best opportunity to grow their business. This paper also describes the pros and cons of using these searh engine optimization techniques in above four companies. We have concluded that these techniques are essential to increase their business profit and minimize their marketing cost.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.
-
Effectiveness of Intrusion Prevention Systems (IPS) in Fast Networks
Authors:
Muhammad Imran Shafi,
Muhammad Akram,
Sikandar Hayat,
Imran Sohail
Abstract:
Computer systems are facing biggest threat in the form of malicious data which causing denial of service, information theft, financial and credibility loss etc. No defense technique has been proved successful in handling these threats. Intrusion Detection and Prevention Systems (IDPSs) being best of available solutions. These techniques are getting more and more attention. Although Intrusion Preve…
▽ More
Computer systems are facing biggest threat in the form of malicious data which causing denial of service, information theft, financial and credibility loss etc. No defense technique has been proved successful in handling these threats. Intrusion Detection and Prevention Systems (IDPSs) being best of available solutions. These techniques are getting more and more attention. Although Intrusion Prevention Systems (IPSs) show a good level of success in detecting and preventing intrusion attempts to networks, they show a visible deficiency in their performance when they are employed on fast networks. In this paper we have presented a design including quantitative and qualitative methods to identify improvement areas in IPSs. Focus group is used for qualitative analysis and experiment is used for quantitative analysis. This paper also describes how to reduce the responding time for IPS when an intrusion occurs on network, and how can IPS be made to perform its tasks successfully without effecting network speed negatively.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.