Chowdhury, Md. Ibrahim; Iqbal, Mohammad; Sultana, Naznin; Rahman, Faisal
December 2013
International Journal of Wireless & Mobile Networks;Dec2013, Vol. 5 Issue 6, p111
Academic Journal
Current mobility models for simultaneous mobility have their convolution in designing simultaneous movement where mobile nodes (MNs) travel randomly from the two adjacent cells at the same time and also have their complexity in the measurement of the occurrences of simultaneous handover. Simultaneous mobility problem incurs when two of the MNs start handover approximately at the same time. As Simultaneous mobility is different for the other mobility pattern, generally occurs less number of times in real time; we analyze that a simplified simultaneous mobility model can be considered by taking only symmetric positions of MNs with random steps. In addition to that, we simulated the model using mSCTP and compare the simulation results in different scenarios with customized cell ranges. The analytical results shows that with the bigger the cell sizes, simultaneous handover with random steps occurrences become lees and for the sequential mobility (where initial positions of MNs is predetermined) with random steps, simultaneous handover is more frequent.


Related Articles

  • Wireless Mobile Evolution to 4G Network. Jaloun, Mohammed; Guennoun, Zouhair // Engineering;Apr2010, Vol. 2 Issue 4, p309 

    In this paper, we give an overview of the evolution of wireless mobiles starting from the first generation which is the analogue system started in 1980's, and passing through the 2G technologies which are all digital networks and GSM is the most popular network. 2.5G networks will introduce the...

  • M-PEGASIS: Energy Efficient Pegasis for Mobile Wireless Sensor Networks. Selem, Enas; Khedr, Ahmed M.; Nassar, Hamed // Egyptian Computer Science Journal;Sep2013, Vol. 37 Issue 6, p33 

    Recent advances in wireless networks have led to many new protocols specifically designed for wireless sensor networks (WSNs) where energy awareness is an essential consideration. In this paper, we have presented an energy efficient PEGASIS protocol for mobile WSN (M-PEGASIS). The key idea of...

  • A Range-based Detection Method of Replication Attacks in Wireless Sensor Networks. Huang Jian; Xiong Yan; Li Ming-xi; Miao Fu you // International Proceedings of Computer Science & Information Tech;2012, Vol. 27, p120 

    Node replication attack is a common attack mode in wireless sensor networks. Attackers capture certain sensor nodes, replicate them and deploy several replicas back into the network for further malicious activities. A number of protocols have been proposed so far to tackle node replication...

  • DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR. Almi'ani, Khaled A.; Almi'ani, Muder; Al-ghonmein, Ali; Al-Moghrabi, Khaldun // International Journal of Wireless & Mobile Networks;Aug2014, Vol. 6 Issue 4, p19 

    In this paper, we investigate the problem of designing the minimum number of required mobile elements tours such that each sensor node is either on the tour or one hop away from the tour, and the length of the tour to be bounded by pre-determined value L. To address this problem, we propose...

  • Performance Analysis of Node Mobility in Beacon and Non-Beacon enabled IEEE 802.15.4 based Wireless Sensor Network. R., Surender; Samundiswary, P. // International Journal of Computer Applications;Aug2013, Vol. 76 Issue 1-16, p32 

    Recent advances in wireless communication technologies have enabled the development of Wireless Sensor Networks (WSNs) that consist of low cost, power and small-size sensor nodes. ZigBee, an IEEE 802.15.4 based wireless sensor networks have been the promise of facilitating large-scale and...

  • Very Low Bit-Rate Video Coding by Combining H.264/AVC Standard and 2-D Discrete Wavelet Transform. Aghagolzadeh, Ali; Meshgini, Saeed; Nooshyar, Mehdi; Aghagolzadeh, Mehdi // Engineering;Apr2010, Vol. 2 Issue 4, p328 

    In this paper, we propose a new method for very low bit-rate video coding that combines H.264/AVC standard and two-dimensional discrete wavelet transform. In this method, first a two dimensional wavelet transform is applied on each video frame independently to extract the low frequency...

  • Cloned Agent based data computed in Homogeneous sensor networks. Karthikeyan, S.; Jayashri, S. // International Journal of Computer Science & Information Security;Sep2012, Vol. 10 Issue 9, p136 

    The innovation in the world of Wireless communication led to progressive use of tiny and multifunctional sensor nodes. These nodes, being small in size can sense the environment, compute data and communicate to a large range. The energy constraint is one of the major limitations in sensor nodes,...

  • Secured Public key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks. Challa, Manoj; Reddy, M. . Damodar; Reddy, P. Venkata Subba; Mungara, Jitendra Nath // International Journal of Computer Science & Network Security;Aug2012, Vol. 12 Issue 8, p84 

    As wireless sensor networks (WSNs) are susceptible to attacks and sensor nodes have limited resources, designing a secure and efficient user authentication protocol for WSNs is a difficult task. Considering that most future large-scale WSNs follow a twotiered architecture, we propose an...

  • On the Use of Wireless Technologies for Shipboard Monitoring Systems. Kdouh, Hussein; Brousseau, Christian; Zaharia, Gheorghe; Farhat, Hanna; Grunfelder, Guy; El Zein, Ghaïs // Wireless Personal Communications;Oct2013, Vol. 72 Issue 3, p1755 

    Current shipboard monitoring systems use extensive lengths of cables to connect sensors to control units. Replacing wired connections by wireless ones may be an efficient solution to reduce the ship weight and cost. Ships are characterized by a specific metallic environment which can severely...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics