Computer Communications (Networks)

Computer Communications (Networks)

  • Leonard Goeirmanto added an answer:
    Can anyone explain, how to reverse engineer any *.apk file, to view original source code of the app?

    I want to perform reverse engineer on a compiled and running *.apk file, but could not find the right way to do it, can anyone help me to guide.

    Leonard Goeirmanto · Universitas Mercu Buana

    agree with Mr. Han that you can not use Eclipse to decompile, here are some references about reverse engineering in mobile apps:

    DOI: 10.1016/j.cose.2014.10.016

    DOI: 10.1109/DEXA.2012.40

    DOI: 10.1109/WCRE.2011.42

  • Zlimann Tanina added an answer:
    How can I eliminate this problem in running CASTEP within material s studio 7?


    Running CASTEP calculations on some structures in materials studio 7 this message appeared and persists:

    Failed to create job for the server: CASTEP. This computer was unable to communicate with the computer providing the server.

    Can someone explain this and resolve it?

    Zlimann Tanina · University M'Hamed Bougara of Boumerdes

    But how to run it locally ? Sorry I'm novice in these things !!!

  • Akhilesh Akhade added an answer:
    What is the role of "Agent" in NetSim WSN simulation ?

    In NetSim WSN, I can see a icon in the GUI for "agent", and also several properties for this including mobility. What is the role of this agent ?

    Akhilesh Akhade · BITS Pilani, K K Birla Goa

    Sensor mobility is available in NetSim v8 onwards. Which version do you use ?

  • Hang Shen added an answer:
    Can anyone recommend papers concerning Secured Adhoc routing in MANET?

    I'm searching for references and links related to above mentioned topic.

    Hang Shen · Nanjing Tech University

    USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks
    IEEE Transactions on Wireless Communications

  • Mohanchur Sarkar added an answer:
    Could anyone present some information, survey, mechanisms about SDN (Software Defined Networking) applied to cloud computing?
    As elastic cloud architectures and dynamic resource allocation evolve and as mobile computer operating systems and virtual machines usage grows, the need has arisen for an additional layer of software-defined networking (SDN). Such a layer allows network operators to specify network services, without coupling these specifications with network interfaces. This enables entities to move between interfaces without changing identities or violating specifications. It can also simplify network operations, where global definitions per identity do not have to be matched to each and every interface location. Such a layer can also reset some of the complexity build-up in network elements by decoupling identity and flow-specific control logic from basic topology-based forwarding, bridging, and routing.

    Mohanchur Sarkar · Indian Space Research Organization

    Please find some material on Software Defined Networking available from internet.

  • Closed account added an answer:
    What kind of simulator could I possibly use for simulating wireless data center topologies?

    I need to analyse their performance in terms of job completion time and if possible  potential interference of wireless links.

    Deleted · Indian Institute of Information Technology Allahabad

    you can use ns3 or opnet...

  • Tahrir Khalil added an answer:
    In experiments to assess performance IPv4 , IPv6 addresses delay in IPv6 always a little more than IPv4 . Is the header of IPv6 size or not ?

    TCP Segment Delay

    Ethernet delay

    Tahrir Khalil · Asia Pacific University of Technology and Innovation

    thank you all

  • Closed account added an answer:
    Which one of Mobile IPv4 and Mobile IPv6 performs better when it comes to sending traffic between Correspondent Node and Mobile Node?

    Please help me to answer the following questions:
    What is the latency in Mobile IPv4 and Mobile IPv6?
    What is the TCP throughput in Mobile IPv4 and Mobile IPv6?
    What are the UDP throughput, loss, and delay in Mobile IPv4 and Mobile IPv6?

    Deleted · Indian Institute of Information Technology Allahabad

    MIPV6 is better than MIPv4 because MIPv6 avoids triangular routing as well as provides better security with end to end connectivity.

  • Dr Hasan Siamian added an answer:
    Is there any other proven and best technique that can be used to maintain the reliability in a Wireless Body Area Network (WBAN)?
    I am planning to use Network coding method in my new remote patient monitoring framework to maintain the reliability of Wireless Body Area Networks (WBAN). Please can anyone suggest the best technique?
    Dr Hasan Siamian · Mazandaran University of Medical Sciences

    Dear, I must know which software and hospital information sstem and which minimum data set are you using?

    I know that if your have good software and good telecommunication system, you can use for monitoring.

    each software has its special function.

    I think that your question is not clear and your question is general.

    all the best.

  • Mohd Shahid Husain added an answer:
    How can an artificial immune system be used for clustering?

    How should I formulate antigens and antibodies to train my system for clustering using AIS?

    Mohd Shahid Husain · Integral University

    Thanks Ivan for your suggestion.

  • Jahandar Jahani added an answer:
    Is there anyone working on P2P network for content distribution?

    Thanks in advance for your replies.

    Jahandar Jahani · Amirkabir University of Technology

    It is better to konw a little about the anatomy of p2p network, found in this paper :

    next you can find some useful info in these papers:

    and some info on coding on these papers:

    Hope it helps you.

  • Marc Jansen added an answer:
    In Mobile Cloud Computing which is cost effective? Task executed by the nearby mobile device or task executed by Cloudlet or Cloud Server?

    We know in Mobile Cloud Computing (MCC), mobile's task are executed in Cloud or CloudLet. Suppose we have 3 mobile device named A, B, C and a Cloud Server named C_Server and a CloudLet named C_Let. Note all the 3 mobile device is connected with the same CloudLet and Cloud Server.

    Now let Mobile Device A needs a service. Now my question is that if the other device (B and C) can perform the task, which will be more cost effective? Offload the task to the C_Server, C_Let or Other mobile device (B and C). Is there any reference paper about this topics?

    Please let me know.

    Thanks in Advance. :)

    Marc Jansen · Hochschule Ruhr West

    Hi Amit,

    i would tend to say that it depends in the requested service. Maybe some services would only be possibly executed in a mobile device, like contextualization. All services that could be deployed to a central cloud instances should usually be offloaded.



  • Peter T Breuer added an answer:
    How can I remove SUMO-0.21.0 in Ubuntu 12.04?

    I want to install SUMO-0.12.3 in order to use MOVE. As I execute command as sudo apt-get remove sumo error comes as unable to locate package sumo.

    I have already tried the command sudo apt-get update. I have attached the file below.If anyone can help with it.

    Thank you

    Peter T Breuer · Birmingham City University

    But Mohsen, he did not try to install it, he tried to remove it. That requires nothing to do with the package repository sources list. It works without any connectivity to the net! The dependencies are constructed from the status file in /var/lib/dpkg. That's the only thing that's needed .. and is the only thing in which we can deduce that the entry for sumo is lacking, which allows us to deduce that either sumo has already been removed, or it was never installed (via the package manager).


  • Mohanchur Sarkar added an answer:
    How to implement Fuzzy Controller in NS2 for controlling congestion?
    I want to simulate congestion control using fuzzy logic in TCP/IP networks. Is there any sample simulation to help me? Thanks
    Mohanchur Sarkar · Indian Space Research Organization

    Create a separate file both header and source which has the fuzzy rules you want to integrate in TCP. Then you can call those rues at appropriate points after understanding the TCP code in ns2. Afterwards recomplete the ns2 source code and evaluate the results with existing protocols. You need to be very clear what changes you want to do and then also understand the ns2 source code pertaining to TCP for doing this. There is a good documentation available to understand ns2 source code. You need to go through it.

  • Matthias Vodel added an answer:
    What key management protocol is used here?

    Either it is symmetric or asymetric.

    Matthias Vodel · Technische Universität Chemnitz

    I confirm the answer: asymmetric encryption.

    Symmetric encryption is not really good scalable for large sized and changing network topologies. (n * (n-1) ) / 2 key pairs would be required.

  • Sai R N added an answer:
    What are the GUI tools for stimulating mobile adhoc network ?

    Suggest any GUI tool which will operate in the same lines as NS2 to stimulate moblie adhoc network 

    Sai R N · BITS Pilani

    I think NetSim is the best for this

  • Ali Mahdi Owayid added an answer:
    Is it true that Information Technology Process Automation (ITPA) will generate cost saving for IT Outsourcing Service Providers?

    Is it true that ITPA will generate cost saving for IT Outsourcing Service Providers? Some people commented that outsourced to countries with lower labor cost can deliver the IT services cheaper than rolling out ITPA – what is your opinion / experience on this?

    Ali Mahdi Owayid · Al Buraimi University College

    In addition to the answers above, i think the scale of organization( small, medium and large)  as well as the offered package of the organization to IT people, all these factors will determine the cost.  Ex. Most of the telecom companies choose outsourcing because their package is high for IT people.

  • Mwangalalo wa-Mbali added an answer:
    Where can I get the source code for the implementation of AOMDV routing protocol in OMNET++?

    I would like to add some optimization functions in the AOMDV routing protocol, i want add the concept of cooperative packet caching, but to do that, i have to have the code for the implementation of AOMDV.

    Mwangalalo wa-Mbali · University of South Africa

    Thank you for your assistance

  • Padma Priya added an answer:
    Which is the best platform to install NS2 on Linux?
    I have to simulate DCCP and UDP on NS2 , for my presentation and showing the differences in throughput, delay, and jitter. I want to know that NS 2.35 standalone supports DCCP simulation, do I have to write any code for this simulation?
    I am new to NS2 n linux platform.
    Help is appreciated.
    Padma Priya · BMS College of Engineering

    Fedora 12, 14 and Ubuntu 12 and 14 both are good.

  • Maragatharajan Muthuswamy added an answer:
    I work on node classification using the markov process. Can anyone share code for this purpose, please?

    Hi, I am doing research on Ad Hoc networks. I want to analyze the behaviour of nodes. Therefore, I have planned to use the markov chain process to monitor the states of the nodes. If any one is doing research related to this please share your commands?

    Maragatharajan Muthuswamy · Kalasalingam University

    Hi all.... Instead of NS2 shall we use GloMoSim for such a simulation

  • Tassoult Nadia added an answer:
    How do I simulate a certificate revocation list (CRL) for VANET in ns2?

    I am trying to simulate an update for CRL in each node and RSU based on an information in the received message from other nodes in the range using ns2.35 and sumo 0.22.

    It is my first experience with the simulation tools and I have no idea how to start.

    I am confused of using Veins (OMNET, SUMO),or NS2 all those tools at the same time.

    I hope you can help me to define what the proposed tools and examples or strategies are to first simulate VANET and then implement a new approach for CRL distribution in VANET.

    However, if you think that another simulation tool may help me in this topic, I will be appreciative of any kind of help.

    Thanks for reading my message,

    Best regards.

    Tassoult Nadia · Université de Béjaïa

    Dear Abdulaziz M. Ghaleb

    Thank you for your response,

    Its a time-limited task,  i don't  want to change from NS2 to NS3 ;

    Thanks for the suggestion.

  • Muhammad Naveed added an answer:
    What is the optimum way to reduce the energy consumption in identifying cluster heads in wireless sensor networks?

    Considering the issues of unequal clustering size and equal clustering size.

    Muhammad Naveed · Frederick University

    Energy efficiency is an important part of WSN. Arie and Lopez have already added valueable stuff. I just wanted to add always take spatial characteristics of WSN specailly asymetricness of Links which makes really un predictable to deal with when you are designing or implementing a protocol for centralized architecture of WSNs.

  • Eduard Babulak added an answer:
    What are the main distinguishing qualities of heterogeneous cellular networks?
    Femto and Pico eNBs are some of the commonly adopted HetNets. Their deployment in the traditional macro base stations is meant to increase capacity to proffer solution to increasing demands for data but these solutions in turn pose greater a problem of interference. If they are important to be adopted why is this so?
    Eduard Babulak · Maharishi University of Management

    Examples of heterogeneous elements include microcells, picocells, femtocells, and distributed antenna systems (remote radio heads), which are distinguished by their transmit powers/ coverage areas, physical size, backhaul, and propagation characteristics. This shift presents many opportunities for capacity improvement,
    and many new challenges to co-existence and network management.

    source: Heterogeneous Cellular Networks: From Theory to Practice in LTE-ADVANCED AND 4G WIRELESS COMMUNICATIONS: PART 2

  • Eduard Babulak added an answer:
    Are there any implementations for contributory group key schemes (e.g. TGDH)?

    It will be much better if the implementations are deployed on platforms such as Android or iOS.

    Eduard Babulak · Maharishi University of Management

    I would recommend reading a paper treating similar topic on: Invitation-Oriented TGDH: Key Management for Dynamic Groups in an Asynchronous Communication Model, presented at Parallel Processing Workshops (ICPPW), 2012 in Pittsburgh, PA, USA.

    In this paper the authors propose a suite of group key management protocols that allows a group of users to agree on a shared group key, which can be used to protect a shared file system stored remotely in the cloud. The protocols supports the refreshment of the group key at each group membership modification. Compared to other similar solutions, the key novelty of our protocols is that they require asynchronous communication channels, and only constant number of exponentiations on average, worst case logarithmic number of exponentiations even if membership modifications are controlled by arbitrary user. Moreover, the proposed scheme is fully decentralized, and its design is led by a practical, invitation-oriented approach.

  • Abdelhakim El Ouadih added an answer:
    What is the difference between AWR, HFSS, ADS, CST?
    Under what circumstances and parameters is each best to be used? General Concept information about Microwave design softwares?
    Abdelhakim El Ouadih · Cadi Ayyad University

    I advise you to have a look up to this file consisting in on a survey about EM simulators either  differential as FEM used by HFSS and FIT used by CST or integral simulators like  FEKO , momentum ADS using MoM.

  • Viengvilay Xayavongsa added an answer:
    How can big data intelligence be applied in smart grid technology?

    Recently, big data intelligence is getting popularity among the researchers for different applications. Can we use the same for smart grid technology?

    Viengvilay Xayavongsa · University of Arkansas - Fort Smith

    In my opinion, the efficiency and fluidity in the execution of data intelligence in terms of smart grid technology and big data is entirely dependent upon the scalability of the architecture within the smart grid itself. I believe, hardware-wise, is the final limiting factor in such systems, but software shouldn't be neglected. You can do only so much with software if you're approaching the absolute limits of the hardware itself.

    The most efficient and scalable "smart grid" technology I can think of right now are the neurons in your brain. From what I understand, your brain can contain up to 100 billion neuron nodes (+/- a few hundred million depending upon epigenetic, evolutionary, and environmental factors) and each node can create up to 10,000 different connections which totals up to a staggering 1 Quadrillion connections (10k x 100 Billion = 1 x 10^15), if all neural connections were saturated at the same time (all in 3 pounds of weight, and it's the most energy efficient supercomputer in the world running on only roughly 12 watts of energy). There is no artificial intelligent computer or grid in existence that can do that, ever (at least for now).

    Keep in mind, when I'm talking about neural connections, it's logical connections, not physical connections. The logical connection algorithms are unique to the neuron itself, which is why you can have two neurons with one physical connection, but you can have the capacity of 10,000 x 10,000 logical connections. You can form 100 million algorithmic logical connections with just two neurons if each neuron contains a capacitance of 10,000 logical connections and each logical connection performs a process and stores a unique memory pattern at the same time. Now THAT, is a smart grid, isn't it great?

    We must analyze and implement our smart grid technology the same way. In other words, let's just try to mimic human neural evolution and apply such concepts to our own artificially fabricated neural networks.  We must examine how we can recall data as fast as we store it (parallel data manipulation). Instead of promoting asynchronous throughput, why not support near flawless completely synchronous full duplex throughput, at least at the local grid level?

    Don't get me wrong, I do understand that the law of thermodynamics applies in terms of data speed in relation to semiconductors and the copper media in which the electrical signals travel through (the brain, unlike the computer, both the processing center and media in which and electrical signal travels are all made of the same material, neurons), but why not have each node that does almost the same thing as a neuron (basically like microscopic routers that can form hundreds of multi-point data connections  with other mini-routers and each logical connection forms a unique memory path and the unique forming of the memory path is also simultaneously a process as if the memory and processing activity were synonymous, not separate), but on a smaller and more energy efficient scale? These mini-routers should function as smoothly and as quickly as a high-end layer-3 switch.

    The only difference between the brain and an artificial machine is that the brain stores memory in the form of neural connections or pathways and this memory can be recalled forming the same neural algorithm. So in reality, the question is how can we build a smart grid that can "store" and "process" data in the form of artificial neural connections at the same time? (parallel function) This will help not only increase data storage capacity, but also increase processing capacity at the same time, of course everything I've state is theoretical, but it doesn't mean it isn't probable or even plausible.

    Allowing this concept to be implemented in current or future technology can pave a pathway for the simultaneous growth of both the grid and data. This allows the grid to evolve in proportion to the amount of data being stored. In essence, two neurons can form 10,000^2 connections (100 million total unique connections) while two transistors can only form 2^2 connections (8 total connections, which doesn't even account for separate memory (because the process itself doesn't hold a memory pattern at the same time, it produces an output, yes, but it doesn't save the output in its own relative logical network path) storage such as cache, RAM, and SSD/HDD). Modern machines are still in their infancy in terms of development, but we're slowly trucking along and correcting fallacies on the way; no rush. :-)

    This is the power of human imagination. Let's dream big shall we?

  • Khalid EL GHOLAMI added an answer:
    How do you send a beacon message in ns-2?

    How do you send a beacon message containing informations like position, and how do you extract this information and signal strength by a second node?

    Khalid EL GHOLAMI · Université Blaise Pascal - Clermont-Ferrand II

    Well In WSN, I guess you're using the wpan model to simulate the IEEE 802.15.4 standard. In this case, you should use the beacon enabled mode. There is some examples in the ns-2 tcl folder for different configurations. (e.g. for NS-2.35 allinone, you can find them here \ns-allinone-2.35\ns-2.35\tcl\ex\wpan)

    To send some data from the coordinator using the Beacon, you should fill the Beacon frame's payload.

    These are the comments from the wpan model's developer inside the function :

    " void Mac802_15_4::beaconTxHandler(bool forTX)"

    /* To populate the beacon payload field, <macBeaconPayloadLength> and <macBeaconPayload> should be set first, in that order (use primitive MLME_SET_request). */

    So right after these comments, the program copies the payload to the beacon for transmission. So you have to fill that field before transmitting the beacon.

    And here is a FAQ from the wpan model's developer (Can be useful to solve some common issues :

  • P. Prakasam added an answer:
    Is there any literature on location prediction in MANET using any swarm intelligence technique ?

    Is there any possibility, we can do any research in this field ?

    P. Prakasam · United Institute of Technology

    Please find the following link which will provide you a very good literature on the same.

  • Hossam Faheem added an answer:
    Is there anyone have worked at Oversim and Omnet++?
    I need to know how to start simulate at oversim and Omnet++
    Hossam Faheem · Ain Shams University

    Of course you have to read the user guide and follow up the necessary steps.

  • Mohanchur Sarkar added an answer:
    Is anybody familiar with VoIP Tech over IPv4/IPv6?
    I require help for my research work in the telecom / networking domain. My research is on assigning/distribution of address space for devices in the telecom domain...
    Mohanchur Sarkar · Indian Space Research Organization

    You can also see Open h323 project ... actually meant for video conferencing over the net it contains source code and lot of information in the domain you want to work. Three is also a vibrant user group where questions/answers in this topic is exchanged. You may get good information on VoIP.

About Computer Communications (Networks)

A computer network is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information.

Topic Followers (48014) See all