A. Bibi's research while affiliated with Gomal University and other places

Publications (23)

Data
Full-text available
In this paper, we propose a new Quality Link Metric (QLM), “Inverse Expected Transmission Count (InvETX),” in Optimized Link State Routing (OLSR) protocol. Then, we compare performance of three existing QLMs which are based on loss probability measurements: Expected Transmission Count (ETX), Minimum Delay (MD), and Minimum Loss (ML) in Static Wirel...
Article
In this paper, we select three most widely used reactive protocols; ad-hoc ondemand distance vector (AODV), dynamic source routing (DSR) and dynamic manet on-demand (DYMO), and model their energy and time consumption costs of expanding ring search (ERS) algorithm in wireless multi-hop networks (WMhNs). A novel contribution of this work is tuning th...
Article
In this paper, we propose a new Quality Link Metric (QLM), ``Inverse Expected Transmission Count (InvETX)'' in Optimized Link State Routing (OLSR) protocol. Then we compare performance of three existing QLMs which are based on loss probability measurements; Expected Transmission Count (ETX), Minimum Delay (MD), Minimum Loss (ML) in Static Wireless...
Conference Paper
Full-text available
Constant monitoring of patients without disturbing their daily activities can be achieved through mobile networks. Sensor nodes distributed in a home environment to provide home assistance gives concept of Wireless Wearable Body Area Networks. Gathering useful information and its transmission to the required destination may face several problems. I...
Article
Frequent topological changes due to high mobility is one of the main issues in Vehicular Ad-hoc NETworks (VANETs). In this paper, we model transmission probabilities of 802.11p for VANETs and effect of these probabilities on average transmission time. To evaluate the effect of these probabilities of VANETs in routing protocols, we select Dynamic So...
Article
Full-text available
An energy efficient routing protocol is the major concern in Wireless Sensor Networks (WSNs). In this survey paper, we present energy efficient hierarchical routing protocols, developed from conventional LEACH routing protocol. Main focus of our study is how these extended protocols work in order to increase the life time and how quality routing pr...
Article
Constant monitoring of patients without disturbing their daily activities can be achieved through mobile networks. Sensor nodes distributed in a home environment to provide home assistance gives concept of Wireless Wearable Body Area Networks. Gathering useful information and its transmission to the required destination may face several problems. I...
Article
Recent advances in wireless communications, system on chip and low power sensor nodes allow realization of Wireless Body Area Networks (WBANs).WBANs comprise of tiny sensors, which collect information of a patient's vital signs and provide a real time feedback. In addition,WBANs also support many applications including ubiquitous healthcare, entert...
Article
In this paper, we evaluate and compare the impact of link duration and path stability of routing protocols; Destination Sequence Distance vector (DSDV), Dynamic MANET On- Demand (DYMO) and Optimized Link State Routing (OLSR) at different number of connections and node density. In order to improve the efficiency of selected protocols; we enhance DYM...
Article
Full-text available
In this paper, a framework for experimental parameters in which Packet Delivery Ratio (PDR), effect of link duration over End-to-End Delay (E2ED) and Normalized Routing Overhead (NRO) in terms of control packets is analyzed and modeled for Mobile Ad-Hoc NETworks (MANETs) and Vehicular Ad-Hoc NETworks (VANETs) with the assumption that nodes (vehicle...
Article
Port knocking is a technique by which only a single packet or special sequence will permit the firewall to open a port on a machine where all ports are blocked by default. It is a passive authorization technique which offers firewall-level authentication to ensure authorized access to potentially vulnerable network services. In this paper, we prese...
Article
One of the major issues in Wireless Body Area Sensor Networks (WBASNs) is efficient localization. There are various techniques for indoor and outdoor environments to locate a person. This study evaluating and compares performance of optimization schemes in indoor environments for optimal placement of wireless sensors, where patients can perform the...
Article
In case of high dynamic topology, reactive routing protocols provide quick convergence by faster route discoveries and route maintenance. Frequent roadcasts reduce routing efficiency in terms of broadcast cost; Bk, and expected time cost; E[t]. These costs are optimized using different mechanisms. So, we select three reactive routing protocols; Ad-...
Article
Full-text available
In this paper, we compare and analyze performance of five quality link metrics forWireless Multi-hop Networks (WMhNs). The metrics are based on loss probability measurements; ETX, ETT, InvETX, ML and MD, in a distance vector routing protocol; DSDV. Among these selected metrics, we have implemented ML, MD, InvETX and ETT in DSDV which are previously...
Article
Full-text available
In this paper, we evaluate and analyze the impact of different network loads and varying no. of nodes on distance vector and link state routing algorithms. We select three well known proactive protocols; Destination Sequenced Distance Vector (DSDV) operates on distance vector routing, while Fisheye State Routing (FSR) and Optimized Link State Routi...
Conference Paper
Full-text available
In this paper, we evaluate and analyze the impact of different network loads and varying no. of nodes on distance vector and link state routing algorithms. We select three well known proactive protocols; Destination Sequenced Distance Vector (DSDV) operates on distance vector routing, while Fish-eye State Routing (FSR) and Optimized Link State Rout...
Article
Full-text available
This paper evaluates and compares the performance of two routing protocols, one is reactive, Dynamic MANET On-Demand (DYMO) and other is proactive, Optimized Link State Routing (OLSR) in Mobile Ad-hoc Networks (MANETs) and Vehicular Ad-hoc Networks (VANETs). Performance of these protocols is analyzed using three performance metrics; Packet Delivery...
Article
In this paper, we simulate the three routing protocols Destination Sequenced Distance Vector (DSDV), Optimized Link state Routing (OLSR), DYnamic MANET On Demand (DYMO) in NS-2 to evaluate and compare their performance using two Mac-layer protocols 802.11 and 802.lip. Comprehensive stimulation work is done for each routing protocol and the performa...
Article
In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). The questions like, how these protocols differ from each other on the basis of imple...
Article
In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficie...
Article
In this paper, we propose a new quality link metric, interference and bandwidth adjusted ETX (IBETX) for wireless multi-hop networks. As MAC layer affects the link performance and consequently the route quality, the metric therefore, tackles the issue by achieving twofold MAC-awareness. Firstly, interference is calculated using cross-layered approa...

Citations

... Moreover, in [16] authors directed a thorough study on the assessment of LEACH dependent clustering protocols, while, scalability and traffic constraints are considered for evaluation of routing protocols in [17]. ...
... The thermal aware routing protocol, which is based on the first-order electromagnetic transmission scheme [61], optimizes energy with the purpose of increasing network lifetime and stability. To calculate the power used by a sensor when sending or receiving a packet, Equations (7)-(9) were used in the frequency model [62]. ...
... The work also relates these requirements to the main link evaluation metrics and points out the associated performance trade-offs. In [17], the authors advance in the analysis by demonstrating the conflicting performances between some QoS-aware metrics as: Minimum Delay (MD) and Minimum Packet Loss (MPL). However, in both works, multiple metrics are not employed. ...
... Packet 0 is already ready to be processed for routing. There are several parameters such as IP precedence, DSCP, buffer size etc are exploited by RED based on which the packets are dropped before congestion occurs [24], [25]. We take the concepts of these techniques and exploit the ML techniques to automate the parametric setup of routing protocols of MANETs. ...
... On the other hand, when the goal is to enable a VoIP (Voice over Internet Protocol) content, the network needs to keep under control the Endto-End Delay (E2ED) [8,9]. Therefore, distinct applications can demand different Quality of Service (QoS) guarantees [6,[10][11][12]. ...
... Many other researchers have simulated related MANET proactive protocols for DSDV and OLSR such as performance evaluation for DSDV and OLSR. The researchers considered the throughput, end to end delay (E2ED) and normalized routing load (NRL) [10]. Some researchers evaluated and compared the Packet Delivery Ratio (PDR), Normalized Routing Overhead (NRO) and average E2ED for DSDV and OLSR [11]. ...
... To calculate the routes for each node it requires link-stat information which is provided by Topology Control (TC) messages. When a node has to advertise the set of links, it sends Topology Control (TC) messages in which links to all nodes of its MPR [16]. ...
... It decreased the volume of ungraded text and scalable for huge networks, though the issue was scalability. Because of scalability, network size was maximized and the accuracy was maximized [16]. ...
... Furthermore, the same authors developed a method to compute the optimum number of clusters in the network, called K opt , based on the size of the network, the position of the BS, the constants of the radio model and the number of the deployed nodes [12]. Several surveys on the improvements of LEACH have been published [22][23][24][25][26]. Interest in LEACH protocol is due to its advantages such as the probabilistic and distributed aspects, the simplicity of the algorithm and the proposed formula, a very interesting condition imposed for the rotation of the role of CH between the nodes of the network and its demonstrated energy efficiency. ...
... The WBANs technique adopts the application of intelligent sensor nodes placed on the human body accompanied by an external coordinator (Anwar et al., 2018;Fujimoto et al., 2018;Manzoor et al., 2012). The body transceiver nodes collect the patient body's vital signals, like the heartbeat and sugar level (Awan et al., 2016). ...